Song et al., 2017 - Google Patents
A distinctive method to improve the security capacity of backscatter wireless systemSong et al., 2017
- Document ID
- 13650161614613030443
- Author
- Song H
- Gao Y
- Sha N
- Zhou Q
- Yao F
- Publication year
- Publication venue
- 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
External Links
Snippet
Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. This paper studies the physical layer security (PLS) performance of a backscatter system which contains several relays and an eavesdropper …
- 238000004891 communication 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saad et al. | On the physical layer security of backscatter wireless systems | |
Wang et al. | Energy-efficient covert communications for bistatic backscatter systems | |
Liu et al. | Covert communication in ambient backscatter systems with uncontrollable RF source | |
Li et al. | Physical layer security for wireless-powered ambient backscatter cooperative communication networks | |
Tran et al. | Proactive attack: A strategy for legitimate eavesdropping | |
Maji et al. | Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link | |
Ibrahim et al. | A new relay and jammer selection schemes for secure one-way cooperative networks | |
Kuhestani et al. | Destination‐based cooperative jamming in untrusted amplify‐and‐forward relay networks: resource allocation and performance study | |
Maji et al. | Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI | |
Wang et al. | Secure wireless powered cooperative communication networks with finite energy storage | |
Zhao et al. | Safeguarding RFID wireless communication against proactive eavesdropping | |
Song et al. | A distinctive method to improve the security capacity of backscatter wireless system | |
Do et al. | Performance analysis of multirelay RF energy harvesting cooperative networks with hardware impairments | |
Xu et al. | Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks | |
Wang et al. | Relay selection for secure backscatter wireless communications | |
Alizadeh et al. | Analysis of capacity and coverage region for Rayleigh fading MIMO relay channel | |
Ghourab et al. | A Novel Approach to Enhance the Physical Layer Channel Security of Wireless Cooperative Vehicular Communication Using Decode‐and‐Forward Best Relaying Selection | |
Sikiru et al. | Physical layer security using boundary technique for emerging wireless communication systems | |
Ding et al. | Relay selection for secrecy improvement in cognitive amplify‐and‐forward relay networks against multiple eavesdroppers | |
Li et al. | Intelligent spectrum control in heterogeneous networks with high security capability | |
Sharma et al. | Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming | |
Li et al. | Security and reliability trade‐off analysis of joint user and jammer selection in the face of co‐channel interference | |
Maji et al. | Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting | |
Kang et al. | Security‐oriented distributed access selection for D2D underlaying cellular networks | |
CN106254029A (en) | The cooperation interference method of analog network coding system |