A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Physical layer wireless security made fast and channel independent
2011
2011 Proceedings IEEE INFOCOM
In contrast, this paper presents a new physical-layer approach to secret key generation that is both fast and independent of channel variations. ...
There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in their channel. ...
In this paper, we investigate a new approach to physical layer security that is independent of channel variations, and thus works even when the channel is static. ...
doi:10.1109/infcom.2011.5934889
dblp:conf/infocom/GollakotaK11
fatcat:fta7agtmyfgdvlgncutl3qhwhy
On interactive secrecy over erasure networks
2012
2012 5th International Symposium on Communications, Control and Signal Processing
In this short review paper we summarize some of our recent results on interactive message secrecy for broadcast erasure channels. ...
One is flexibility, i.e., the physical layer becomes oblivious to different security requirements; for example the same physical layer can be used to generate secure keys as well as message security, as ...
In particular using the channel conditioning of (2), we design the physical layer (nested) wiretap code to create (multiple-level) erasure channels, independent and identically distributed for users. ...
doi:10.1109/isccsp.2012.6217871
dblp:conf/isccsp/CzapPDF12
fatcat:tgi6pkacuzfujac4ubxjjz332u
Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security
2016
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)
wireless communication channel. ...
Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising ...
CONCLUSION We have presented a physical layer key generation technique that exploits the randomness of the wireless channel to generate secret keys to secure automotive wireless communication using symmetric ...
doi:10.1109/iccps.2016.7479103
dblp:conf/iccps/WanLF16
fatcat:qfo4jynn6bctfahqeccvnz2ppa
Wireless physical layer security
2016
Proceedings of the National Academy of Sciences of the United States of America
For the reasons noted above, wireless physical layer security has become a major research topic in recent years, and consider-able progress has been made in understanding the fundamental ability of the ...
wireless physical layer). ...
This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1. ...
doi:10.1073/pnas.1618130114
pmid:28028211
pmcid:PMC5224364
fatcat:arb5vh24l5cjvpfgaeg3uedysy
On IEEE 802.11: Wireless Lan Technology
2013
International Journal of Mobile Network Communications & Telematics
IEEE 802.11,which is a set of physical layer standard for implementing wireless local area network computer communication in the 2.4,3.6,5 and 60GHz frequency band. ...
But the introduction of the IEEE 802.11 standards have made a huge impact on the market such that laptops, PCs, printers, cellphones, and VoIP phones, MP3 players in our homes, in offices and even in public ...
IEEE 802.11r Published in the year 2008, IEEE 802.11r or fast BSS transition (FT) enabled wireless connectivity with secure and fast handoffs between STAs [32] . ...
doi:10.5121/ijmnct.2013.3405
fatcat:uw7e3octwzh7jjn4wyidnxfxp4
A Survey on Cooperative Jamming Applied to Physical Layer Security
2015
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security. ...
Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory. ...
Even though the fast channel variations and the wireless medium's broadcast nature may cause additional challenges, physical layer security technique exploits the properties of the wireless transmissions ...
doi:10.1109/icuwb.2015.7324413
dblp:conf/icuwb/AtallahKK15
fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q
An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
2016
IEEE Access
The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. ...
In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. ...
What distinguishes physical layer security compared to other high layers cryptographic techniques is that it exploits the randomness and the fluctuations of the wireless channel to achieve security at ...
doi:10.1109/access.2016.2612585
fatcat:lhpjsjnkl5gg7oqjticfmww3x4
Overview of 5G security technology
2018
Science China Information Sciences
wireless access physical layer and system security communication technology research" in January 2015. ...
Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied ...
Physical layer security with air interface The use of physical layer security [50] [51] [52] , which exploits the diversity and variability of wireless channels and the uniqueness and reciprocity of channels ...
doi:10.1007/s11432-017-9426-4
fatcat:qva7tdx2xfc7lj3d5fslym6dsi
Performance evaluation of cooperative mobile communication security using reinforcement learning
2021
Heliyon
In wireless networks, there are many channel impairments including shadowing, path loss, and fading. ...
Quite recently, the advancement in the cellular network has resulted in new security requirements and challenges. ...
A research [9] , has applied a new physical-layer security approach that generates a key independent of channel variations. ...
doi:10.1016/j.heliyon.2021.e07108
pmid:34095592
pmcid:PMC8167236
fatcat:ckqiwvqgcbcmjh3vkfxa6f72x4
A collaborative physical layer security scheme
2019
International Journal of Electrical and Computer Engineering (IJECE)
In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. ...
<p>High level of security is essential in wireless 5G communications. ...
Proposed solution Robust and low complexity physical layer security methods can supplement or replace cryptographic techniques. ...
doi:10.11591/ijece.v9i3.pp1924-1934
fatcat:vnmzlya5rnd6xmprc232wg7oxa
Integration Application Technologies and Performance Analysis of Very High Throughput Wi-Fi in Dense Deployment Networks
2017
DEStech Transactions on Computer Science and Engineering
The paper proposes network architecture based on software-defined networking (SDN), wireless network virtualization, the enhanced authentication and the fast handoff to achieve scalability, interference ...
immunity and security, aiming to reduce adverse effects of the dense deployment on the performance of very high throughput (VHT) Wi-Fi. ...
As data nodes, APs are no longer independent physical entities but virtual processing resources. ...
doi:10.12783/dtcse/cst2017/12514
fatcat:7wx7zx5pbbde3d77hfwmyqp3ju
Six Key Enablers for Machine Type Communication in 6G
[article]
2019
arXiv
pre-print
Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important ...
The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. ...
March 14, 2019 DRAFT
Physical layer security (PLS) techniques enable secure transmission while preventing eavesdropping by exploiting the wireless channel characteristics. ...
arXiv:1903.05406v1
fatcat:wsrguijsfjbe7p5lf6a3ibr5lm
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities
2019
Entropy
Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. ...
The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. ...
All the authors contributed equally to the paper writing, revision, correction and proof reading. ...
doi:10.3390/e21050497
pmid:33267211
fatcat:zpxpobcv4rbbnpfldljtn3dh2a
Safeguarding 5G wireless communication networks using physical layer security
2015
IEEE Communications Magazine
a high security level at the physical layer. ...
radio, and wireless security. ...
doi:10.1109/mcom.2015.7081071
fatcat:ow3da4lejzfo3pcjp2s7dpmr6i
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. ...
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. ...
and parameters to well adapt the channel changes the eavesdropper made it possible to achieve secrecy at the physical layer. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
« Previous
Showing results 1 — 15 out of 13,147 results