-
Essay / Physical Layer Security
The number of research works on physical layer security has increased in recent years. This number will certainly continue to grow with the emergence of networks (without a central command zone) and the military use/service of 5G and beyond wireless communication systems. What sets physical layer security apart from other higher layer ways of doing things (related to secret computer codes) is that it uses (for selfish reasons) chance and the ups and downs of the channel wirelessly to (achieve or gain with effort) security at reduced complex difficulty. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay Information theoretical security dates back to 1949, when Shannon presented his pioneering work on computational/code systems. Shannon's work thinks/believes in the secure transmission of private information when a random secret key is shared between legal/real and real parties, and a person (allowing something to happen without reacting or trying to stop it) 'stop) who secretly listens to conversations is intercepting the communication. After a few years, Wayner's model, called eavesdropping, takes advantage of channel errors and flaws to secure a transmission at the physical level without the need for a shared secret key. Since then, studies of electronic eavesdropping channels have found a new field of research and have extended to more general communication systems; such as in the field of broadcast channels, fading channels, multi-user networks and many other wireless communication models. In detail, securing fading channels against possible eavesdropping attacks is of extremely high interest, especially with regard to unprecedented growth. of programs and computer devices for wireless communication. The sad and immediate behavior of the attenuation model is that it takes advantage of the randomness of the ups and downs of the channel gain to secure the transmission against possible people who secretly eavesdrop on the conversations, at the level of the physical layer itself . As a result, even if the person secretly eavesdropping on the conversations has a better average signal-to-noise ratio (SNR) than the legal/real and true receiver, physical layer security can still be applied on the fading channels without having to need/order sharing. of a secret key. The generalized term to recognize the inexperienced/low quality of channel fading, the inevitable knowledge of Channel State Information (CSI) is indispensable. Basically the goal of physical layer security is to (make something as small as possible/treat something important as unimportant) the amount of private information that can be received/obtained by users illegal based on their received signals. To (effortfully accomplish or gain) secure communications over wireless channels, physical layer security explores the changing/different properties of the fading channel, intelligently designs the channel code, and processes the transmitted signals, instead to depend. Basically the goal of physical layer security is to (make something as small as possible/treat something important as unimportant) the amount of private information that can be received/obtained by illegal users by depending on their received signals. or win with effort) secure communications over wireless channels, physical layer security explores the.