Physical layer security using boundary technique for emerging wireless communication systems

dc.contributor.authorSikiru, Ismaeel Abiodun
dc.contributor.authorOlawoyin, L. A.
dc.contributor.authorFaruk, N.
dc.contributor.authorOloyede, A. A.
dc.contributor.authorAbdulkarim, A.
dc.contributor.authorImam-Fulani, Yusuf Olayinka
dc.contributor.authorSowande, O. A.
dc.contributor.authorGarba, S.
dc.contributor.authorImoize, A. L.
dc.date.accessioned2023-06-26T08:54:41Z
dc.date.available2023-06-26T08:54:41Z
dc.date.issued2022-11-04
dc.description.abstractThebroadcastnatureofradiopropagationinwirelesscommunicationhasbeen aretheoretical,andafewareenhancedforefficientsecurityagainstanintruder. (eavesdroppers).Thephysicallayersecuritytechniquesoperateatthelowest deployedtosafeguardagainstsophisticatedattacks.Mostofthesedeployments Inthisarticle,aboundarytechniqueapproachisproposedandappliedtothe physicallayertoimproveitssecrecy-capacityandsubdueadversaryeffectsat probability,secrecy-capacity,andintercept-probabilityshowthatourproposed Carlosimulationwasperformed.Theresultobtainedusingsecrecyoutage theupperlayer.However,techniquessuchaschannelcoding,power(directional legitimatereceiver.Thesimulationresultswerecomparedwiththeanalytical receiverhasabettersignaltonoiseratiothanthecorrespondingeavesdropper’s methods.Itwasfoundthatthechannelbetweenthetransmitterandthemain antennaandartificialnoise),andspreadspectrumhavebeen(andcontinuously) stackofOSIlayeragainstconventionalcryptographicapproaches,operatingat suspectedastheloopholesofpassiveoractiveattacksbyunauthorizedusers thelegitimatereceiver.Hybridperformancemetricswereadopted,andaMonte channel.Conclusively,performanceoftheproposedtechniqueisvalidatedfor techniquesenhancethesecrettransmissionbetweenthemaintransmitterand applicationsinemergingwirelesscommunicationsystems.en_US
dc.identifier.urihttps://doi.org/10.1002/spy2288
dc.identifier.urihttps://uilspace.unilorin.edu.ng/handle/20.500.12484/11270
dc.language.isoenen_US
dc.publisherWileyen_US
dc.subjectboundary technique, MISOME, physical layer, physical layer security, security enhancement techniques, wireless communication systems, wireless security systemsen_US
dc.titlePhysical layer security using boundary technique for emerging wireless communication systemsen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
14_JIP_SecurityAndPrivacy.pdf
Size:
2.96 MB
Format:
Adobe Portable Document Format
Description:
Main article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections