مقاله انگلیسی رایگان در مورد قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری (IEEE)

مقاله انگلیسی رایگان در مورد قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری (IEEE)

 

مشخصات مقاله
انتشار مقاله سال ۲۰۱۸
تعداد صفحات مقاله انگلیسی  ۱۰ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه IEEE
نوع مقاله ISI
عنوان انگلیسی مقاله Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks
ترجمه عنوان مقاله قرار دادن کش ترکیبی برای امنیت فیزیکی لایه در شبکه های همیاری
فرمت مقاله انگلیسی  PDF
رشته های مرتبط فناوری اطلاعات و فناوری اطلاعات و ارتباطات
گرایش های مرتبط دیتا، شبکه های کامپیوتری، رایانش امن
دانشگاه School of Computer Science and Educational Software – Guangzhou University – China
کلمات کلیدی خوشه های رله، قرار دادن کش ترکیبی (HCP)، امنیت لایه فیزیکی، احتمالات وقفه امنیتی، ظرفیت امنیت متوسط
کد محصول E5662
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
I. INTRODUCTION

The issues of security have taken on an increasingly important role in wireless communication networks. Traditionally, cryptographic technologies are used to secure the communications, and a cipher system for the information theoretic analysis of cryptography was first proposed by Shannon in [1]. In [2], a theoretic foundation for physical layer security framework is proposed. In this paper, Wyner introduced a wiretap channel model, showed that secure communication is feasible without cryptography technology as long as the eavesdropper’s channel is worse than the legitimate user’s channel. From Wyner’s wiretap channel model, the authors extended to study the secrecy capacity over Gaussian channel in [3]. The average secrecy capacity and secrecy outage probability in Rayleigh fading channels have been studied in [4]. To enhance the secrecy performance of wireless communications, relay and jammer selection techniques have been used in [5]–[۱۳]. Specifically, the relaying techniques for enhancing the physical layer security have been studied in [5] and [9]. In [10] and [11], the optimal relay selection schemes based on AF and DF have been presented to improve wireless security and prevent eavesdropping attacks. The idea that selecting jammer sends intentional interference to jam the eavesdroppers has been studied in [7] and [12]. In addition, the works about the secrecy performance analysis have been studied in [14]–[۲۰]. Specifically, the secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels has been well studied in [16]. The works of roundrobin scheduling, optimal user scheduling and suboptimal user scheduling schemes to protect the CUsCBS transmissions against the eavesdropping attacks have been presented in [17]. In [20], the authors presented the work about the transmit antenna selection for physical layer security of a MIMO system. And the other work of MIMO has been studied in [21]. Moreover, the work of joint user and relay selection algorithm for cooperative non-orthogonal multiple access networks has been studied in [22].

ثبت دیدگاه