Physical Layer Security: Authentication, Integrity and Confidentiality.
Mahdi Shakiba-HerfehArsenia ChortiH. Vincent PoorPublished in: CoRR (2020)
Keyphrases
- physical layer
- integrity verification
- data confidentiality
- wireless communication
- application layer
- network layer
- resource utilization
- smart grid
- information security
- access control
- data quality
- mac protocol
- security requirements
- channel coding
- bit error rate
- communication systems
- multipath
- communication protocol
- fading channels
- data security
- computer networks
- end to end
- data integrity
- cognitive radio
- wireless ad hoc networks
- multi hop
- ad hoc networks
- load balancing
- wireless networks