Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps.
Mariam Abu Al-AttaKarim A. SaidMohamed A. MohamedWalid RaslanPublished in: Entropy (2023)
Keyphrases
- physical layer
- wireless communication
- network layer
- chaotic maps
- communication systems
- resource utilization
- application layer
- bit error rate
- security policies
- image encryption
- power consumption
- smart grid
- access control
- communication protocol
- multipath
- encryption algorithm
- video streaming
- security requirements
- channel coding
- information security
- mac protocol
- routing protocol