Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
In wireless environment , the communication across various users are established. To establish a secure transmission we need to track the entire process of layered approach . It is obvious that wireless environment uses a standard OSI model and protect the information in higher layer with the help of encryption techniques. Nowadays researchers focuses on providing a security at various layer not alone in application itself. Hereby we tend to focus on physical layer security since many researchers had focused on transmission channel in theoretical setup. There are two types of threats in physical layers are Jamming and Eavesdropping. There are various detecting mechanisms such as two way training based detector , ERD etc to detect the presence of adversaries.
Keywords:
Two way training based detector, ERD , Jamming, Eavesdropping
Cite Article:
"A Scrutiny about Physical Layer Security", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2455-2631, Vol.2, Issue 2, page no.7 - 9, March-2017, Available :http://www.ijrti.org/papers/IJRTI1703002.pdf
Downloads:
000205297
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator