Exploiting Mapping Diversity for Enhancing Security at Physical Layer in the Internet of Things
Citations
18 citations
14 citations
Cites background from "Exploiting Mapping Diversity for En..."
...INTRODUCTION Assuring security for Internet of Things (IoT) networks nowadays is the matter great urgency due to several applications, such as defense, banking and health systems [1]....
[...]
14 citations
Cites background from "Exploiting Mapping Diversity for En..."
...Going further, with regard to the use case, even though the technology is evolving rapidly, certain IoT applications cannot be further developed without a regulatory framework in place as explained in [29]....
[...]
9 citations
Cites background from "Exploiting Mapping Diversity for En..."
...Besides, due to the widespread deployment of IIoT, secure information transfer is also a critical issue in its implementation [3], [4]....
[...]
8 citations
References
7,826 citations
[...]
7,129 citations
"Exploiting Mapping Diversity for En..." refers background in this paper
...Wyner [4] and Csiszar and Korner [5] are a few among the pioneers in PLS to show that the information transfer can indeed be perfectly secure....
[...]
6,469 citations
"Exploiting Mapping Diversity for En..." refers background in this paper
...Therefore, the cross over probability in converting “0” to “1” or 1 to 0 at the receiver due to the error induced by the channel is given by [19]...
[...]
3,570 citations
"Exploiting Mapping Diversity for En..." refers background in this paper
...Wyner [4] and Csiszar and Korner [5] are a few among the pioneers in PLS to show that the information transfer can indeed be perfectly secure....
[...]