[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Song et al., 2017 - Google Patents

A distinctive method to improve the security capacity of backscatter wireless system

Song et al., 2017

Document ID
13650161614613030443
Author
Song H
Gao Y
Sha N
Zhou Q
Yao F
Publication year
Publication venue
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)

External Links

Snippet

Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. This paper studies the physical layer security (PLS) performance of a backscatter system which contains several relays and an eavesdropper …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/155Ground-based stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Similar Documents

Publication Publication Date Title
Saad et al. On the physical layer security of backscatter wireless systems
Wang et al. Energy-efficient covert communications for bistatic backscatter systems
Liu et al. Covert communication in ambient backscatter systems with uncontrollable RF source
Li et al. Physical layer security for wireless-powered ambient backscatter cooperative communication networks
Tran et al. Proactive attack: A strategy for legitimate eavesdropping
Maji et al. Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link
Ibrahim et al. A new relay and jammer selection schemes for secure one-way cooperative networks
Kuhestani et al. Destination‐based cooperative jamming in untrusted amplify‐and‐forward relay networks: resource allocation and performance study
Maji et al. Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI
Wang et al. Secure wireless powered cooperative communication networks with finite energy storage
Zhao et al. Safeguarding RFID wireless communication against proactive eavesdropping
Song et al. A distinctive method to improve the security capacity of backscatter wireless system
Do et al. Performance analysis of multirelay RF energy harvesting cooperative networks with hardware impairments
Xu et al. Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks
Wang et al. Relay selection for secure backscatter wireless communications
Alizadeh et al. Analysis of capacity and coverage region for Rayleigh fading MIMO relay channel
Ghourab et al. A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode‐and‐Forward Best Relaying Selection
Sikiru et al. Physical layer security using boundary technique for emerging wireless communication systems
Ding et al. Relay selection for secrecy improvement in cognitive amplify‐and‐forward relay networks against multiple eavesdroppers
Li et al. Intelligent spectrum control in heterogeneous networks with high security capability
Sharma et al. Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming
Li et al. Security and reliability trade‐off analysis of joint user and jammer selection in the face of co‐channel interference
Maji et al. Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting
Kang et al. Security‐oriented distributed access selection for D2D underlaying cellular networks
CN106254029A (en) The cooperation interference method of analog network coding system