110 Hits in 6.3 sec

UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks [article]

Aly Sabri Abdalla, Keith Powell, Vuk Marojevic, Giovanni Geraci
2020 arXiv   pre-print
We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks.  ...  UAVs are being considered for integration into emerging 5G networks as aerial users or network support nodes.  ...  The research community has been looking into physical layer security approaches to ensure the confidentiality and security of 5G networks [4] [5] . The work presented in [6]  ... 
arXiv:2007.00244v1 fatcat:iapfdl3pqrge3h2f3e3tb4wm6m

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2018 IEEE Access  
The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized.  ...  This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks.  ...  By only considering one kind attack, the cooperation of jammer or eavesdroppers are not considered in PLS, which can make the security in PHY more complex.  ... 
doi:10.1109/access.2017.2779146 fatcat:yjroccchnbbzbmmlmug4q7ge4q

Wireless Secrecy Regions With Friendly Jamming

João P. Vilela, Matthieu Bloch, João Barros, Steven W. McLaughlin
2011 IEEE Transactions on Information Forensics and Security  
We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security  ...  Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not  ...  Acknowledgements The authors gratefully acknowledge useful discussions with Tiago T. V. Vinhoza and Rui A. Costa from Universidade do Porto, Portugal.  ... 
doi:10.1109/tifs.2011.2111370 fatcat:23umkpxljzgmzfitmjmrxsbcwy

Collusive Eavesdropping in Interference Alignment Based Wireless Networks

Nan Zhao, F. Richard Yu, Yunfei Chen, Victor C. M. Leung
2017 IEEE Transactions on Wireless Communications  
., the external jammer, the internal eavesdropper, the external eavesdropper with CSI available, and the external eavesdropper with CSI unknown.  ...  ., the external jammer, the internal eavesdropper, the external eavesdropper with CSI available, and the external eavesdropper with CSI unknown.  ... 
doi:10.1109/twc.2017.2712644 fatcat:zqzp42n5izeivb6ck4amosqecm

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
2016 Proceedings of the IEEE  
Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each  ...  We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer.  ...  Vol. 104, No. 9, September 2016 | Proceedings of the IEEE 1747 Fig. 21 . 21 Cooperative diversity system consisting of an SN, M relays, and a DN in the presence of an eavesdropper.  ... 
doi:10.1109/jproc.2016.2558521 fatcat:yttlvv4vlne5hh5l4zs6qlh2ra

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

Lei Wang, Yueming Cai, Yulong Zou, Weiwei Yang, Lajos Hanzo
2016 IEEE Transactions on Vehicular Technology  
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information  ...  The impact of the direct source-eavesdropper link and additional performance comparisons with respect to other related selection schemes are further included.  ...  Li, "Effect of feedback delay on secure cooperative 969 networks with joint relay and jammer selection," IEEE Wireless Commun. 970 Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013. 971 [25] X.  ... 
doi:10.1109/tvt.2015.2478029 fatcat:nya5ilc5sfhtzninffwzir6jou

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
Key issues are discussed along with potential solutions.  ...  However, as the definition and implementation of 5G networks are in progress, many security challenges arise.  ...  et al.: Safeguarding MTC at the PHY: Potentials and Challenges FIGURE 2 . 2 Different jamming strategies in physical layer security: a) cooperative jamming scenario with an external jammer, b) cooperative  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks.  ...  in wireless networks.  ...  Internal Eavesdropper An internal eavesdropper typically refers to an untrusted relay in relay networks.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Game-theoretic Learning Approaches for Secure D2D Communications Against Full-duplex Active Eavesdropper

Yijie Luo, Zhibin Feng, Han Jiang, Yang Yang, Yuzhen Huang, Junnan Yao
2019 IEEE Access  
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE).  ...  We consider the scenario that when the FAE intrudes the D2D underlaying cellular networks, it can passively wiretap confidential messages in D2D communications and actively jam all legitimate links.  ...  cellular networks with a FAE.  ... 
doi:10.1109/access.2019.2906845 fatcat:imbtpspz65d2pmhzwa2mwtbkoa

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  The survey concludes with observations on potential research directions in this area.  ...  In an early work on eavesdropping in cellular CDMA networks with multi-user detection capabilities, the outage probability of the eavesdropper signal-to-interference ratio was adopted as the performance  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2020 arXiv   pre-print
In this paper, we survey the security issues, applications, techniques, and challenges arising in wireless networks powered via EH technologies.  ...  Surfaces, that could trigger the interest of industry and academia and unleash the full potential of pervasive EH wireless networks.  ...  The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.  ... 
arXiv:2004.10394v2 fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je

An Overview of Key Technologies in Physical Layer Security

Abraham Sanenga, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, Joseph Monamati Chuma
2020 Entropy  
Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network.  ...  Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided.  ...  Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/e22111261 pmid:33287029 fatcat:ngkceebvprbbbkrwamjzqtwaci

Wireless Physical-Layer Security: Lessons Learned From Information Theory

Aylin Yener, Sennur Ulukus
2015 Proceedings of the IEEE  
This paper reviews recent findings in this area, along with strategies for cooperating with unauthenticated entities rather than treating them as eavesdroppers.  ...  This article aims to provide an overview of research results in information-theoretic security with multiple wireless transmitters, and focuses on distilling insights for designing wireless systems with  ...  Yener would like to thank Mohamed Nafea and Ahmed Zewail for their help with figures.  ... 
doi:10.1109/jproc.2015.2459592 fatcat:hf6tojbyebag7np62odsstzc34

Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective

Chuan Ma, Jiaqi Liu, Xiaohua Tian, Hui Yu, Ying Cui, Xinbing Wang
2014 IEEE Transactions on Communications  
We consider a large-scale D2D-enabled cellular network with eavesdroppers overhearing cellular communications.  ...  In D2D-enabled cellular networks, interference generated by D2D communications is usually viewed as an obstacle to cellular communications.  ...  The authors are with the Department of Electronic Engineering, Shanghai Jiao Tong University, China, e-mail: {oknewkimi, 13-liujiaqi, xtian, yuhui, cuiying, xwang8}  ... 
doi:10.1109/tcomm.2014.2379633 fatcat:6j4c6nuy55b4hdammcomqrxxay

Secure Wireless Powered and Cooperative Jamming D2D Communications

Zheng Chu, Huan X. Nguyen, Tuan Anh Le, Mehmet Karamanoglu, Enver Ever, Adnan Yazici
2018 IEEE Transactions on Green Communications and Networking  
provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers.  ...  This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only  ...  In [39] , the D2D network plays a CJ role to interfere with the eavesdroppers for the improvement of the security in cellular networks.  ... 
doi:10.1109/tgcn.2017.2763826 dblp:journals/tgcn/ChuNLKEY18 fatcat:skepdycoivedbao275c4rhnbpa
« Previous Showing results 1 — 15 out of 110 results