Physical layer security using boundary technique for emerging wireless communication systems
| dc.contributor.author | Sikiru, Ismaeel Abiodun | |
| dc.contributor.author | Olawoyin, L. A. | |
| dc.contributor.author | Faruk, N. | |
| dc.contributor.author | Oloyede, A. A. | |
| dc.contributor.author | Abdulkarim, A. | |
| dc.contributor.author | Imam-Fulani, Yusuf Olayinka | |
| dc.contributor.author | Sowande, O. A. | |
| dc.contributor.author | Garba, S. | |
| dc.contributor.author | Imoize, A. L. | |
| dc.date.accessioned | 2023-06-26T08:54:41Z | |
| dc.date.available | 2023-06-26T08:54:41Z | |
| dc.date.issued | 2022-11-04 | |
| dc.description.abstract | Thebroadcastnatureofradiopropagationinwirelesscommunicationhasbeen aretheoretical,andafewareenhancedforefficientsecurityagainstanintruder. (eavesdroppers).Thephysicallayersecuritytechniquesoperateatthelowest deployedtosafeguardagainstsophisticatedattacks.Mostofthesedeployments Inthisarticle,aboundarytechniqueapproachisproposedandappliedtothe physicallayertoimproveitssecrecy-capacityandsubdueadversaryeffectsat probability,secrecy-capacity,andintercept-probabilityshowthatourproposed Carlosimulationwasperformed.Theresultobtainedusingsecrecyoutage theupperlayer.However,techniquessuchaschannelcoding,power(directional legitimatereceiver.Thesimulationresultswerecomparedwiththeanalytical receiverhasabettersignaltonoiseratiothanthecorrespondingeavesdropper’s methods.Itwasfoundthatthechannelbetweenthetransmitterandthemain antennaandartificialnoise),andspreadspectrumhavebeen(andcontinuously) stackofOSIlayeragainstconventionalcryptographicapproaches,operatingat suspectedastheloopholesofpassiveoractiveattacksbyunauthorizedusers thelegitimatereceiver.Hybridperformancemetricswereadopted,andaMonte channel.Conclusively,performanceoftheproposedtechniqueisvalidatedfor techniquesenhancethesecrettransmissionbetweenthemaintransmitterand applicationsinemergingwirelesscommunicationsystems. | en_US |
| dc.identifier.uri | https://doi.org/10.1002/spy2288 | |
| dc.identifier.uri | https://uilspace.unilorin.edu.ng/handle/20.500.12484/11270 | |
| dc.language.iso | en | en_US |
| dc.publisher | Wiley | en_US |
| dc.subject | boundary technique, MISOME, physical layer, physical layer security, security enhancement techniques, wireless communication systems, wireless security systems | en_US |
| dc.title | Physical layer security using boundary technique for emerging wireless communication systems | en_US |
| dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 14_JIP_SecurityAndPrivacy.pdf
- Size:
- 2.96 MB
- Format:
- Adobe Portable Document Format
- Description:
- Main article
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: