Next Article in Journal
Automated Denudation of Oocytes
Next Article in Special Issue
Demonstration of 144-Gbps Photonics-Assisted THz Wireless Transmission at 500 GHz Enabled by Joint DBN Equalizer
Previous Article in Journal
Development of a Flexible MEMS Sensor for Subsonic Flow
Previous Article in Special Issue
A Dual-Band Eight-Element MIMO Antenna Array for Future Ultrathin Mobile Terminals
 
 
Article
Peer-Review Record

Secure Transmission of Terahertz Signals with Multiple Eavesdroppers

Micromachines 2022, 13(8), 1300; https://doi.org/10.3390/mi13081300
by Yuqian He 1, Lu Zhang 1, Shanyun Liu 2, Hongqi Zhang 1 and Xianbin Yu 1,2,*
Reviewer 1:
Reviewer 2: Anonymous
Micromachines 2022, 13(8), 1300; https://doi.org/10.3390/mi13081300
Submission received: 4 July 2022 / Revised: 29 July 2022 / Accepted: 9 August 2022 / Published: 12 August 2022
(This article belongs to the Special Issue Broadband Terahertz Devices and Communication Technologies)

Round 1

Reviewer 1 Report

The authors addressed the security concerns when multiple eavesdroppers are considered in a THz signal transmission. This paper is well written and seems technically sound. However, the following issues should be considered.

1. PEC is not defined.

2. Should cite recent articles that focus on similar issues and include a comparative discussion. See https://doi.org/10.1109/TVT.2022.3172763  

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

1. Please refer to the 'Study exposes security vulnerabilities in terahertz data links; (https://phys.org/news/2018-10-exposes-vulnerabilities-terahertz-links.html), which discusses how placing objects at the very edge of a beam that is capable of scattering a tiny portion of the beam can be a cause. I suggest the authors discuss the More directional beam in THz in the article.

2. Authors have discussed SNR (which is good); I suggest the author discuss 'Normalized Secrecy Capacity,' a characterization of the maximum transmission rate at which the eavesdropper cannot decode any information.

3. PLS based on artificial noise (AN) and PLS channel coding are the most used techniques for achieving this channel security capacity. PLS based on artificial noise (AN) and PLS channel coding provides interference to eavesdroppers to reduce the channel capacity of eavesdropping channels and increase the channel security capacity. The PLS employing AN interferes with eavesdroppers to reduce the channel capacity of eavesdropping channels and increase the channel security capacity. The authors have discussed AN in the abstract but didn't mention it anywhere else in the paper as a study. Also, I suggest discussing Channel Coding.

4. THz of unlicensed bandwidth is also an issue of secrecy, and eavesdroppers' authors should include the discussion in the article.

5. I also suggest that authors include, what are the possible strategies researchers are discussing, and possible implementation? How effective are those techniques?

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

This paper can be accepted in its current form.

Back to TopTop