A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks
[article]
2020
arXiv
pre-print
We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks. ...
UAVs are being considered for integration into emerging 5G networks as aerial users or network support nodes. ...
The research community has been looking into physical layer security approaches to ensure the confidentiality and security of 5G networks [4] [5] . The work presented in [6] ...
arXiv:2007.00244v1
fatcat:iapfdl3pqrge3h2f3e3tb4wm6m
Security for 5G Mobile Wireless Networks
2018
IEEE Access
The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. ...
This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. ...
By only considering one kind attack, the cooperation of jammer or eavesdroppers are not considered in PLS, which can make the security in PHY more complex. ...
doi:10.1109/access.2017.2779146
fatcat:yjroccchnbbzbmmlmug4q7ge4q
Wireless Secrecy Regions With Friendly Jamming
2011
IEEE Transactions on Information Forensics and Security
We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security ...
Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not ...
Acknowledgements The authors gratefully acknowledge useful discussions with Tiago T. V. Vinhoza and Rui A. Costa from Universidade do Porto, Portugal. ...
doi:10.1109/tifs.2011.2111370
fatcat:23umkpxljzgmzfitmjmrxsbcwy
Collusive Eavesdropping in Interference Alignment Based Wireless Networks
2017
IEEE Transactions on Wireless Communications
., the external jammer, the internal eavesdropper, the external eavesdropper with CSI available, and the external eavesdropper with CSI unknown. ...
., the external jammer, the internal eavesdropper, the external eavesdropper with CSI available, and the external eavesdropper with CSI unknown. ...
doi:10.1109/twc.2017.2712644
fatcat:zqzp42n5izeivb6ck4amosqecm
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
2016
Proceedings of the IEEE
Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each ...
We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. ...
Vol. 104, No. 9, September 2016 | Proceedings of the IEEE 1747
Fig. 21 . 21 Cooperative diversity system consisting of an SN, M relays, and a DN in the presence of an eavesdropper. ...
doi:10.1109/jproc.2016.2558521
fatcat:yttlvv4vlne5hh5l4zs6qlh2ra
Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays
2016
IEEE Transactions on Vehicular Technology
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information ...
The impact of the direct source-eavesdropper link and additional performance comparisons with respect to other related selection schemes are further included. ...
Li, "Effect of feedback delay on secure cooperative
969
networks with joint relay and jammer selection," IEEE Wireless Commun.
970
Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
971
[25] X. ...
doi:10.1109/tvt.2015.2478029
fatcat:nya5ilc5sfhtzninffwzir6jou
Safeguarding MTC at the Physical Layer: Potentials and Challenges
2020
IEEE Access
Key issues are discussed along with potential solutions. ...
However, as the definition and implementation of 5G networks are in progress, many security challenges arise. ...
et al.: Safeguarding MTC at the PHY: Potentials and Challenges
FIGURE 2 . 2 Different jamming strategies in physical layer security: a) cooperative jamming scenario with an external jammer, b) cooperative ...
doi:10.1109/access.2020.2996383
fatcat:espxiyuqnfgcvgw2yxy4p24vxy
Applications of Economic and Pricing Models for Wireless Network Security: A Survey
[article]
2017
arXiv
pre-print
Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks. ...
in wireless networks. ...
Internal Eavesdropper An internal eavesdropper typically refers to an untrusted relay in relay networks. ...
arXiv:1707.07846v1
fatcat:xb3jvolwmjad7oxdefdd2pq7dq
Game-theoretic Learning Approaches for Secure D2D Communications Against Full-duplex Active Eavesdropper
2019
IEEE Access
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). ...
We consider the scenario that when the FAE intrudes the D2D underlaying cellular networks, it can passively wiretap confidential messages in D2D communications and actively jam all legitimate links. ...
cellular networks with a FAE. ...
doi:10.1109/access.2019.2906845
fatcat:imbtpspz65d2pmhzwa2mwtbkoa
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
The survey concludes with observations on potential research directions in this area. ...
In an early work on eavesdropping in cellular CDMA networks with multi-user detection capabilities, the outage probability of the eavesdropper signal-to-interference ratio was adopted as the performance ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges
[article]
2020
arXiv
pre-print
In this paper, we survey the security issues, applications, techniques, and challenges arising in wireless networks powered via EH technologies. ...
Surfaces, that could trigger the interest of industry and academia and unleash the full potential of pervasive EH wireless networks. ...
The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF. ...
arXiv:2004.10394v2
fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je
An Overview of Key Technologies in Physical Layer Security
2020
Entropy
Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. ...
Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. ...
Abbreviations The following abbreviations are used in this manuscript: ...
doi:10.3390/e22111261
pmid:33287029
fatcat:ngkceebvprbbbkrwamjzqtwaci
Wireless Physical-Layer Security: Lessons Learned From Information Theory
2015
Proceedings of the IEEE
This paper reviews recent findings in this area, along with strategies for cooperating with unauthenticated entities rather than treating them as eavesdroppers. ...
This article aims to provide an overview of research results in information-theoretic security with multiple wireless transmitters, and focuses on distilling insights for designing wireless systems with ...
Yener would like to thank Mohamed Nafea and Ahmed Zewail for their help with figures. ...
doi:10.1109/jproc.2015.2459592
fatcat:hf6tojbyebag7np62odsstzc34
Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective
2014
IEEE Transactions on Communications
We consider a large-scale D2D-enabled cellular network with eavesdroppers overhearing cellular communications. ...
In D2D-enabled cellular networks, interference generated by D2D communications is usually viewed as an obstacle to cellular communications. ...
The authors are with the Department of Electronic Engineering, Shanghai Jiao Tong University, China, e-mail: {oknewkimi, 13-liujiaqi, xtian, yuhui, cuiying, xwang8}@sjtu.edu.cn. ...
doi:10.1109/tcomm.2014.2379633
fatcat:6j4c6nuy55b4hdammcomqrxxay
Secure Wireless Powered and Cooperative Jamming D2D Communications
2018
IEEE Transactions on Green Communications and Networking
provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. ...
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only ...
In [39] , the D2D network plays a CJ role to interfere with the eavesdroppers for the improvement of the security in cellular networks. ...
doi:10.1109/tgcn.2017.2763826
dblp:journals/tgcn/ChuNLKEY18
fatcat:skepdycoivedbao275c4rhnbpa
« Previous
Showing results 1 — 15 out of 110 results