Rand-OFDM: A Secured Wireless Signal
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[3] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[4] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[5] Dirk Grunwald,et al. Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.
[6] S. Weinstein,et al. Data Transmission by Frequency-Division Multiplexing Using the Discrete Fourier Transform , 1971 .
[7] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[8] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[9] Guang Gong,et al. A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[10] Ali Chehab,et al. An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach , 2019, IEEE Internet of Things Journal.
[11] Changho Suh,et al. Comparative study of time-domain and frequency-domain channel estimation in MIMO-OFDM systems , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[12] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[13] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[14] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[15] Haji M. Furqan,et al. Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[16] Peter J. Rousseeuw,et al. Clustering by means of medoids , 1987 .
[17] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[18] Haji M. Furqan,et al. Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[19] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[20] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[21] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[22] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[23] Rafael F. Schaefer,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[24] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[25] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[26] Mohamed-Slim Alouini,et al. On the Finite-SNR Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme under Secrecy Constraint , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).