2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON) 2017
DOI: 10.1109/wamicon.2017.7930246
|View full text |Cite
|
Sign up to set email alerts
|

Secure key management for 5G physical layer security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Eve demodulates r ae (t) and r be (t), and can only obtain random sequence Y e = X a ⊕ X b ⊕ H ae ⊕ H be ⊕ N ae ⊕ N be (9) where H ae = [h ae (1), h ae (2), . .…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Eve demodulates r ae (t) and r be (t), and can only obtain random sequence Y e = X a ⊕ X b ⊕ H ae ⊕ H be ⊕ N ae ⊕ N be (9) where H ae = [h ae (1), h ae (2), . .…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
“…. , h ae (n)] ∈ (0, 1) n denotes errors that the wireless channel causes to the random sequence X a during demodulating r ae (t); H be = [h be (1), h be (2), . .…”
Section: Analysis and Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…There is also a corresponding study of the scheme of adding artificial noise (AN) to the SISO, but the SISO channel has no extra freedom to provide. [14][15][16] At this point, when the channels of Alice-Bob and Alice-Eve are both exact SISO channels, the channel capacity of the secure transmission has been comprehensively studied and shows that only when the Alice-Bob channel is stronger than the Alice-Eve channel to obtain a positive safe transfer rate. Furthermore, it is found that the use of reasonable power distribution, combined with opportunistic communication and AN design, can make the channel gain of Alice-Bob channel to be less than the average channel gain difference of Alice-Eve channel.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the conventional secrecy techniques that assume any limitations on the adversary side are inappropriate to achieve a secure information transmission. Recently, researchers have demonstrated a significant interest in the physical layer security (PLS) to give an additional layer of security [11][12][13][14]. Physical layer security is defined as the study of different techniques for improving the security of networks by exploiting the wireless channel characteristics.…”
Section: Introductionmentioning
confidence: 99%