A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things
The role of the internet of things (IoT) and cyberspace in a digital society is well recognized,
and they have become tremendously popular due to certain features like the ability to ease …
and they have become tremendously popular due to certain features like the ability to ease …
On the performance of layered transmission with optimum decoding ordering and multiuser diversity for a K-user downlink scenario
In this work, the performance of layered transmission with optimum decoding order and
multiuser diversity is analyzed in a K-user downlink network. The transmitter is equipped …
multiuser diversity is analyzed in a K-user downlink network. The transmitter is equipped …
[PDF][PDF] Designing enhanced Security Architecture for 5G Networks
YK Sharma - Journal Homepage: http://www. ijmra. us, 2018 - academia.edu
Abstract 5G systems will give chances to the making of new administrations, for new plans of
action, and for new players to enter the versatile market. The systems will bolster efficient …
action, and for new players to enter the versatile market. The systems will bolster efficient …
Utility maximization based on cross-layer design for multi-service in macro-femto heterogeneous networks
X Zhang, Z Tan, S Xu, C Tao - IEEE transactions on wireless …, 2013 - ieeexplore.ieee.org
We have developed a new cross-layer scheme, which can efficiently characterize the
interactions across five layers. The optimization problem is formulated, so as to maximize the …
interactions across five layers. The optimization problem is formulated, so as to maximize the …
Cross‐layer queueing analysis for aggregated ON–OFF arrivals with adaptive modulation and coding
X Han, J Schormans - IET Communications, 2016 - Wiley Online Library
Packet loss and delay in wireless networks is a function of both the traffic characteristics (eg
load, burstiness) and the characteristic behaviour of the fading channel. In this study, the …
load, burstiness) and the characteristic behaviour of the fading channel. In this study, the …
Wireless device authentication techniques using physical-layer device fingerprint
P Hao - 2015 - search.proquest.com
Due to the open nature of the radio signal propagation medium, wireless communication is
inherently more vulnerable to various attacks than wired communication. Consequently …
inherently more vulnerable to various attacks than wired communication. Consequently …
Security Issues on IoT Environment In Wireless Network Communications
K Gowthami - International Journal of Wireless Networks and …, 2019 - igi-global.com
Abstract The Internet of Things (IoT) integrates a giant range of physical objects that
measures items that are unambiguously known, ubiquitously interconnected and accessible …
measures items that are unambiguously known, ubiquitously interconnected and accessible …
A Physical Encryption Scheme for OTFS System
J Chen, X Lu, W Li, Y Huang, Y Tang… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
As a special aerial communication device, unmanned aerial vehicle (UAV) is widely used in
military and civilian applications. High-speed movement of the terminal and openness of the …
military and civilian applications. High-speed movement of the terminal and openness of the …
[PDF][PDF] Queueing analysis in multiuser multi-packet transmission systems using spatial multiplexing
B Bellalta, A Faridi, J Barcelo, V Daza… - arXiv preprint arXiv …, 2012 - academia.edu
Abstract Multiuser Multi-Packet Transmission (MPT) from an Access Point (AP) equipped
with multiple antennas to multiple single antenna nodes can be achieved by exploiting the …
with multiple antennas to multiple single antenna nodes can be achieved by exploiting the …