13,147 Hits in 5.8 sec

Physical layer wireless security made fast and channel independent

Shyamnath Gollakota, Dina Katabi
2011 2011 Proceedings IEEE INFOCOM  
In contrast, this paper presents a new physical-layer approach to secret key generation that is both fast and independent of channel variations.  ...  There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in their channel.  ...  In this paper, we investigate a new approach to physical layer security that is independent of channel variations, and thus works even when the channel is static.  ... 
doi:10.1109/infcom.2011.5934889 dblp:conf/infocom/GollakotaK11 fatcat:fta7agtmyfgdvlgncutl3qhwhy

On interactive secrecy over erasure networks

Laszlo Czap, Vinod M. Prabhakaran, Suhas Diggavi, Christina Fragouli
2012 2012 5th International Symposium on Communications, Control and Signal Processing  
In this short review paper we summarize some of our recent results on interactive message secrecy for broadcast erasure channels.  ...  One is flexibility, i.e., the physical layer becomes oblivious to different security requirements; for example the same physical layer can be used to generate secure keys as well as message security, as  ...  In particular using the channel conditioning of (2), we design the physical layer (nested) wiretap code to create (multiple-level) erasure channels, independent and identically distributed for users.  ... 
doi:10.1109/isccsp.2012.6217871 dblp:conf/isccsp/CzapPDF12 fatcat:tgi6pkacuzfujac4ubxjjz332u

Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security

Jiang Wan, Anthony Bahadir Lopez, Mohammad Abdullah Al Faruque
2016 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)  
wireless communication channel.  ...  Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising  ...  CONCLUSION We have presented a physical layer key generation technique that exploits the randomness of the wireless channel to generate secret keys to secure automotive wireless communication using symmetric  ... 
doi:10.1109/iccps.2016.7479103 dblp:conf/iccps/WanLF16 fatcat:qfo4jynn6bctfahqeccvnz2ppa

Wireless physical layer security

H. Vincent Poor, Rafael F. Schaefer
2016 Proceedings of the National Academy of Sciences of the United States of America  
For the reasons noted above, wireless physical layer security has become a major research topic in recent years, and consider-able progress has been made in understanding the fundamental ability of the  ...  wireless physical layer).  ...  This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1.  ... 
doi:10.1073/pnas.1618130114 pmid:28028211 pmcid:PMC5224364 fatcat:arb5vh24l5cjvpfgaeg3uedysy

On IEEE 802.11: Wireless Lan Technology

Sourangsu Banerji, Rahul Singha Chowdhury
2013 International Journal of Mobile Network Communications & Telematics  
IEEE 802.11,which is a set of physical layer standard for implementing wireless local area network computer communication in the 2.4,3.6,5 and 60GHz frequency band.  ...  But the introduction of the IEEE 802.11 standards have made a huge impact on the market such that laptops, PCs, printers, cellphones, and VoIP phones, MP3 players in our homes, in offices and even in public  ...  IEEE 802.11r Published in the year 2008, IEEE 802.11r or fast BSS transition (FT) enabled wireless connectivity with secure and fast handoffs between STAs [32] .  ... 
doi:10.5121/ijmnct.2013.3405 fatcat:uw7e3octwzh7jjn4wyidnxfxp4

A Survey on Cooperative Jamming Applied to Physical Layer Security

Michael Atallah, Georges Kaddoum, Long Kong
2015 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)  
This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security.  ...  Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory.  ...  Even though the fast channel variations and the wireless medium's broadcast nature may cause additional challenges, physical layer security technique exploits the properties of the wireless transmissions  ... 
doi:10.1109/icuwb.2015.7324413 dblp:conf/icuwb/AtallahKK15 fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q

An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2016 IEEE Access  
The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security.  ...  In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty.  ...  What distinguishes physical layer security compared to other high layers cryptographic techniques is that it exploits the randomness and the fluctuations of the wireless channel to achieve security at  ... 
doi:10.1109/access.2016.2612585 fatcat:lhpjsjnkl5gg7oqjticfmww3x4

Overview of 5G security technology

Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi
2018 Science China Information Sciences  
wireless access physical layer and system security communication technology research" in January 2015.  ...  Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied  ...  Physical layer security with air interface The use of physical layer security [50] [51] [52] , which exploits the diversity and variability of wireless channels and the uniqueness and reciprocity of channels  ... 
doi:10.1007/s11432-017-9426-4 fatcat:qva7tdx2xfc7lj3d5fslym6dsi

Performance evaluation of cooperative mobile communication security using reinforcement learning

Gebrehiwet Gebrekrstos Lema, Kiros Siyoum Weldemichael, Leake Enqay Weldemariam
2021 Heliyon  
In wireless networks, there are many channel impairments including shadowing, path loss, and fading.  ...  Quite recently, the advancement in the cellular network has resulted in new security requirements and challenges.  ...  A research [9] , has applied a new physical-layer security approach that generates a key independent of channel variations.  ... 
doi:10.1016/j.heliyon.2021.e07108 pmid:34095592 pmcid:PMC8167236 fatcat:ckqiwvqgcbcmjh3vkfxa6f72x4

A collaborative physical layer security scheme

Dimitrios Efstathiou
2019 International Journal of Electrical and Computer Engineering (IJECE)  
In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique.  ...  <p>High level of security is essential in wireless 5G communications.  ...  Proposed solution Robust and low complexity physical layer security methods can supplement or replace cryptographic techniques.  ... 
doi:10.11591/ijece.v9i3.pp1924-1934 fatcat:vnmzlya5rnd6xmprc232wg7oxa

Integration Application Technologies and Performance Analysis of Very High Throughput Wi-Fi in Dense Deployment Networks

Yue ZHAO, Zhou-guo CHEN, Jian-wei DING, Yu-bin GUO, En-bo SUN, Hong SU
2017 DEStech Transactions on Computer Science and Engineering  
The paper proposes network architecture based on software-defined networking (SDN), wireless network virtualization, the enhanced authentication and the fast handoff to achieve scalability, interference  ...  immunity and security, aiming to reduce adverse effects of the dense deployment on the performance of very high throughput (VHT) Wi-Fi.  ...  As data nodes, APs are no longer independent physical entities but virtual processing resources.  ... 
doi:10.12783/dtcse/cst2017/12514 fatcat:7wx7zx5pbbde3d77hfwmyqp3ju

Six Key Enablers for Machine Type Communication in 6G [article]

Nurul Huda Mahmood, Hirley Alves, Onel Alcaraz López, Mohammad Shehab, Diana P. Moya Osorio, Matti Latva-aho
2019 arXiv   pre-print
Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important  ...  The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity.  ...  March 14, 2019 DRAFT Physical layer security (PLS) techniques enable secure transmission while preventing eavesdropping by exploiting the wireless channel characteristics.  ... 
arXiv:1903.05406v1 fatcat:wsrguijsfjbe7p5lf6a3ibr5lm

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities

Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, Aiqun Hu
2019 Entropy  
Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices.  ...  The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives.  ...  All the authors contributed equally to the paper writing, revision, correction and proof reading.  ... 
doi:10.3390/e21050497 pmid:33267211 fatcat:zpxpobcv4rbbnpfldljtn3dh2a

Safeguarding 5G wireless communication networks using physical layer security

Nan Yang, Lifeng Wang, Giovanni Geraci, Maged Elkashlan, Jinhong Yuan, Marco Di Renzo
2015 IEEE Communications Magazine  
a high security level at the physical layer.  ...  radio, and wireless security.  ... 
doi:10.1109/mcom.2015.7081071 fatcat:ow3da4lejzfo3pcjp2s7dpmr6i

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry.  ...  The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation.  ...  and parameters to well adapt the channel changes the eavesdropper made it possible to achieve secrecy at the physical layer.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4
« Previous Showing results 1 — 15 out of 13,147 results