A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
In this paper, a new hybrid scheme for physical layer security based on encryption and wireless channel pre-compensation is proposed. The security is provided by transforming the basic signal constellation into a higher order signal constellation with the help of conventional encryption m...
| Main Authors: | Tahir, Mohammad, Siddiqi, Mohammad Umar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Taylor & Francis
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/35421/ http://irep.iium.edu.my/35421/2/Taylor_and_Francis_-_IETE_Journal_of_Research_-03772063.2014.914690_-_Aug_29_2014.pdf |
Similar Items
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
A review on multiplexing schemes for MIMO channel sounding
by: Ullah, Mohammad Habib, et al.
Published: (2009)
by: Ullah, Mohammad Habib, et al.
Published: (2009)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Dynamic channel allocation scheme for mobile satellite systems
by: Anthony, Angeline, et al.
Published: (2003)
by: Anthony, Angeline, et al.
Published: (2003)
Adaptive load balancing algorithm for wireless distributed computing networks
by: Alfaqawi, Mohammed, et al.
Published: (2016)
by: Alfaqawi, Mohammed, et al.
Published: (2016)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Performance evaluation of OFDM schemes over multipath fading channels
by: Saeed, Mohd Abdo, et al.
Published: (2003)
by: Saeed, Mohd Abdo, et al.
Published: (2003)
Radio propagation measurement and channel modelling for wireless body area network
by: Wan Nordin, Mimi Aminah, et al.
Published: (2011)
by: Wan Nordin, Mimi Aminah, et al.
Published: (2011)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Wireless decode-and-forward relay channels: time allocation strategies for cooperation and optimum operation
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
Joint channel assignment and routing in multiradio multichannel wireless mesh networks: Design considerations and approaches
by: Zakaria, Omar M., et al.
Published: (2016)
by: Zakaria, Omar M., et al.
Published: (2016)
Image Transmission Over Wireless Channel
by: Singh, Arwinder
Published: (2005)
by: Singh, Arwinder
Published: (2005)
A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm
by: Alfaqawi, Mohammed, et al.
Published: (2013)
by: Alfaqawi, Mohammed, et al.
Published: (2013)
Utilising signal measurement in bandwidth reservation scheme for QoS provisioning in multimedia wireless networks
by: ,, Prihandoko, et al.
Published: (2003)
by: ,, Prihandoko, et al.
Published: (2003)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
AWGN and rayleigh fading behavior of the wireless decode-and-forward relay channel with arbitrary time and power allocation
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
Coalition formation for throughput enhancement in cognitive radio wireless networks
by: Tahir, Mohammad, et al.
Published: (2015)
by: Tahir, Mohammad, et al.
Published: (2015)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Similar Items
-
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010) -
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010) -
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016) -
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009) -
A review on multiplexing schemes for MIMO channel sounding
by: Ullah, Mohammad Habib, et al.
Published: (2009)