In this paper, wireless sensor network (WSN) security issue in the presence of an eavesdropper is analysed. The sensor-sink as well as sensor-eavesdropper channels are assumed to be subjected to generalized-K fading. According to the physical layer security framework, we ...
Exchange of crucial and confidential information leads to the unprecedented attention on the security problem in wireless networks. Though the security has been studied in a number of works, the joint optimization of the physical layer security and the end-to-end delay management, which requires a...
analysis of the IEEE 802.15.4a UWB physical layer (PHY), a novel short range wireless communication technology, for wireless sensor network (WSN) ... EIS Saadon,J Abdullah,N Ismail - Wireless Technology & Applications 被引量: 5发表: 2013年 Energy-Efficient Physical Layer Design for Wireless ...
A physical layer device includes a link layer interface , a physical layer logic circuit , and ports to . In addition to these components, the physical layer device includes therein a test link layer circuit , a test physical layer logic circuit , and switches to in order to test the opera...
Comparative Analysis of Physical Layer Network Coding-Based Random Access Techniques in WSN Communications This article focuses on enhancing random access methods in wireless communication systems through the introduction of the physical layer network coding tec... L Mansour,M Hicham - International Confere...
In this paper we propose a LTE physical layer parallel system architecture based on multicore GPP to match up the high capacity requests of LTE air interface. Firstly, we analyzed the complexity of each LTE physical layer module and made a statistics of their processing time. And then we ...
Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks 来自 IEEEXplore 喜欢 0 阅读量: 32 作者:JA Sánchez,PM Ruiz 摘要: In the last few years, the amount of work in the field of routing algorithms for WSN has ...
We start by giving a brief introduction to the fundamental principles of physical layer security and jamming. Then we classify jamming strategies from three different perspectives and explain the major related designs in various scenarios. Finally, we discuss the open issues of jamming that can be ...
Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach The massive integration of low-cost communication networks and Internet of Things (IoT) in today's...
Use the trial-and-error process to figure out that there are ten hidden layer nodes. The first 50 groups of data in the sample are utilized for network training, while the final 25 groups of data are used for output prediction. The key code to realize the prediction of the improved ...