The number of research works on physical layer security has increased in recent years. This number is certainly expected to continue to grow with the advent of networks (without having a central command area) and military use/service of 5G and beyond wireless communications systems. What distinguishes physical layer security from other ways of doing things at high levels (tied to secret computer codes) is that it uses (for selfish reasons) the randomness and ebbs and flows of the wireless channel to (achieve or achieve with effort) safety at a reduced complex difficulty level. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Theoretical information security dates back to 1949, when Shannon introduced his pioneering work on computing/coding systems. Shannon's work thinks/believes in the secure transmission of private information when a random secret key is shared between the legal/real and true parties, and a person (allowing something to happen without reacting or trying to stop it) secretly listening to the conversations is intercept the communication. After a few years, Wayner's model, called wiretap channel, exploits channel errors and defects to protect a transmission at the physical layer without the need for a shared secret key. Since then, studies on interception channels have enormously found a new field of research and have been extended to more general communication systems; such as in the field of broadcast channels, fading channels, multi-user networks and many other wireless communication models. In detail, protecting fading channels from possible eavesdropping attacks is of extremely important interest, especially in relation to the never-before-seen growth of wireless communication computer programs and devices. The sad and immediate behavior of the fading model is that it exploits the randomness of the ups and downs of the channel gain to protect the transmission from possible people secretly listening to the conversations, at the physical level itself. As a result, even if the person secretly listening to the conversations has a better average signal-to-noise ratio (SNR) than the legal/real and real receiver, the physical layer security can still be on dying channels without having/ordering sharing. of a secret key. The generalized term to recognize the poor/inexperienced quality of channel fading, the inevitable knowledge of channel status information (CSI) is required. Basically, the goal of physical layer security is (to make something as small as possible/to treat something as important as unimportant) the amount of private information that can be received/obtained by illegal users based on the signals received. To secure communications over wireless channels (achieve or achieve with effort), physical layer security explores the changing/different properties of the fading channel, intelligently designs the channel code, and processes the transmitted signals, instead of depending on it . Basically, the goal of physical layer security is (make something as small as possible/treat something important as unimportant) the amount of private information that can be received/obtained by illegal users based on the signals received. or hard-earned) secure communications over wireless channels, physical layer security explores the changing/different properties of the fading channel, intelligently designs the channel code and processes the transmitted signals, instead of depending on it. Most jobs.
tags