Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Garba, S."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Item
    Physical layer security using boundary technique for emerging wireless communication systems
    (Wiley, 2022-11-04) Sikiru, Ismaeel Abiodun; Olawoyin, L. A.; Faruk, N.; Oloyede, A. A.; Abdulkarim, A.; Imam-Fulani, Yusuf Olayinka; Sowande, O. A.; Garba, S.; Imoize, A. L.
    Thebroadcastnatureofradiopropagationinwirelesscommunicationhasbeen aretheoretical,andafewareenhancedforefficientsecurityagainstanintruder. (eavesdroppers).Thephysicallayersecuritytechniquesoperateatthelowest deployedtosafeguardagainstsophisticatedattacks.Mostofthesedeployments Inthisarticle,aboundarytechniqueapproachisproposedandappliedtothe physicallayertoimproveitssecrecy-capacityandsubdueadversaryeffectsat probability,secrecy-capacity,andintercept-probabilityshowthatourproposed Carlosimulationwasperformed.Theresultobtainedusingsecrecyoutage theupperlayer.However,techniquessuchaschannelcoding,power(directional legitimatereceiver.Thesimulationresultswerecomparedwiththeanalytical receiverhasabettersignaltonoiseratiothanthecorrespondingeavesdropper’s methods.Itwasfoundthatthechannelbetweenthetransmitterandthemain antennaandartificialnoise),andspreadspectrumhavebeen(andcontinuously) stackofOSIlayeragainstconventionalcryptographicapproaches,operatingat suspectedastheloopholesofpassiveoractiveattacksbyunauthorizedusers thelegitimatereceiver.Hybridperformancemetricswereadopted,andaMonte channel.Conclusively,performanceoftheproposedtechniqueisvalidatedfor techniquesenhancethesecrettransmissionbetweenthemaintransmitterand applicationsinemergingwirelesscommunicationsystems.

University of Ilorin Library © 2024, All Right Reserved

  • Cookie settings
  • Send Feedback
  • with ❤ from dspace.ng