Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








950 Hits in 5.9 sec

A Survey on Cooperative Jamming Applied to Physical Layer Security

Michael Atallah, Georges Kaddoum, Long Kong
2015 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)  
This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security.  ...  Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory.  ...  PHYSICAL LAYER SECURITY AND COOPERATIVE JAMMING A.  ... 
doi:10.1109/icuwb.2015.7324413 dblp:conf/icuwb/AtallahKK15 fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q

Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network

Sheetal Bagali, R. Sundaraguru
2020 International Journal of Electrical and Computer Engineering (IJECE)  
The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device  ...  For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA).  ...  For satisfying, an opportunistic spectrum access (OSA) model with adjustable spectrum access probability is required at MAC layer.  ... 
doi:10.11591/ijece.v10i3.pp3284-3294 fatcat:qemoi367tfbydmiynr3ktnkd5e

Anomalous spectrum usage attack detection in cognitive radio wireless networks

CaLynna Sorrells, Paul Potier, Lijun Qian, Xiangfang Li
2011 2011 IEEE International Conference on Technologies for Homeland Security (HST)  
Another example is a smart jammer, who can scan the spectrum and jam channels selectively.  ...  In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation.  ...  With the collected physical and network layer information, accurate spectrum awareness across the network can be achieved and discrepancy between the information from the two layers can be identified.  ... 
doi:10.1109/ths.2011.6107900 fatcat:dg7uznyvpvey3j6hlz2iuhljlq

Wireless Communication, Sensing, and REM: A Security Perspective

Haji M. Furqan, Muhammad Sohaib J. Solaija, Halise Turkmen, Huseyin Arslan
2021 IEEE Open Journal of the Communications Society  
INDEX TERMS 5G, 6G, cryptography, joint radar and communication (JRC), physical layer security, radio environment mapping (REM), REM security, sensing security, vehicle-to-everything (V2X) communication  ...  Sections IV, V, and VI discuss the exploratory, manipulation, disruption attacks with solutions, respectively.  ...  and possible physical layer solutions for securing REM and utilizing REM for security.  ... 
doi:10.1109/ojcoms.2021.3054066 fatcat:klhorbflvvdrlkqyndctn3lwtq

On jamming detection methods for satellite Internet of Things networks

Giorgio Taricco, Nader Alagha
2021 International Journal of Satellite Communications And Networking  
Specifically, in this paper, we address a class of jamming attacks in which the adversary uses the underlying knowledge of the satellite physical and access protocol to increase the jamming impact.  ...  More specifically, we introduce a simple (counting) jamming detection method along with numerical results for realistic system parameters, which confirms system design vulnerability as well as how the  ...  denial of service attack by jamming the physical or access layer.  ... 
doi:10.1002/sat.1431 fatcat:xzbmvkhkhbcm5hajo3qyhmhzrq

A Survey on the Communication Protocols and Security in Cognitive Radio Networks

Natarajan Meghanathan
2022 International Journal of Communication Networks and Information Security  
There is no comprehensive review paper available on the strategies for medium access control (MAC), routing and transport layer protocols, and the appropriate representative solutions for CRNs.  ...  This paper would serve as a good comprehensive review and analysis of the strategies for MAC, routing and transport protocols and security issues for CRNs as well as would lay a strong foundation for someone  ...  informs the physical layer to sense for available channels and prepare for a channel switch.  ... 
doi:10.17762/ijcnis.v5i1.249 fatcat:vtw4ktuovbawnexgglej6jncxu

Table of contents

2020 IEEE Transactions on Communications  
Haas 1675 Physical Layer Security A Secure and Robust Frequency and Time Diversity Aided OFDM-DCSK Modulation System Not Requiring Channel State Information ............................................  ...  Moharir 1593 Rate Selection for Wireless Random Access Networks Over Block Fading Channels ..................................... ........................................................................  ... 
doi:10.1109/tcomm.2020.2974334 fatcat:rcatbpjhunc7jeb7e3ynpx7fl4

Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art

Vandana Milind Rohokale, Neeli Rashmi Prasad, Ramjee Prasad
2012 Journal of Cyber Security and Mobility  
Physical layer security (PLS) is the imminent security guarantee for the cooperative communication.  ...  One morning, we were waiting for our college bus. The Wipro industry bus was slowly passing nearby us looking for its employees.  ...  The authors have projected a topology control mechanism with authentication for throughput enhancement by combining higher layer security techniques with physical layer security techniques for CWC.  ... 
doi:10.13052/jcsm2245-1439.1235 fatcat:tb7kdqbyrfdaxghm24ytvb6vza

Table of contents

2019 IEEE Transactions on Communications  
Alouini 2245 Physical Layer Security Learning-Aided Physical Layer Authentication as an Intelligent Process ............ H. Fang, X.  ...  Cognitive Radio Systems Source-Channel Coding Improper Gaussian Signaling for Multiple-Access Channels in Underlay Cognitive Radio ................................ ...................................  ... 
doi:10.1109/tcomm.2019.2897183 fatcat:lzbqxlv4srhzpdrrltonxno5oi

Node Selection Algorithm for Routing Protocols in VANET

Aruna Sharma, Simar Preetsingh
2016 International Journal of Advanced Science and Technology  
It is mainly used for hop to hop communication, channel access contention. VANET is to provide safety for passenger and drivers on the road.  ...  Giving media service around VANET might need a QOS aware routing protocol that always has to calculate the accessible resources.  ...  Being a wireless network, Issues in VANET domain include random packet loss in transport layer and in data link layer for a given end to end connection.  ... 
doi:10.14257/ijast.2016.96.05 fatcat:uiqyhe4bw5ce3pyaby4ezppdeu

Editorial: Wireless Communications and Networks for 5G and Beyond

Trung Q. Duong, Nguyen-Son Vo
2019 Journal on spesial topics in mobile networks and applications  
In the same research stream of physical layer security, the authors of the second paper study BA Physical Layer Network Coding (PNC) Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission  ...  The underlying idea of the proposed dynamic key encryption scheme is to leverage the random and dynamic nature of the physical communication channel towards reaching a high security level with minimal  ...  In the same research stream of physical layer security, the authors of the second paper study BA Physical Layer Network Coding (PNC) Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission  ... 
doi:10.1007/s11036-019-01232-8 fatcat:acmfqfwdmnbzxelxxn6m2fnlkq

Physical-Layer Security in 6G Networks

L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, A. Stoica, G. Abreu, H. Haas
2021 IEEE Open Journal of the Communications Society  
In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.  ...  To trust the services provided by such network, security is a mandatory feature by design.  ...  Integrating physical layer with cybersecurity is the key to face security challenges of future 6G networks.  ... 
doi:10.1109/ojcoms.2021.3103735 fatcat:kcntnplyqnc45bp5i5wceiwk4m

SPECTRUM SENSING AND SECURITY CONCERNS IN SOFTWARE-DEFINED RADIO AND COGNITIVE RADIO NETWORKS

T. L Singal
2020 International Journal of Engineering Applied Sciences and Technology  
However, requirement for providing adequate level of security is the main challenge for wide deployment of CRNs. The issues of security and robustness in CRNs have gained momentum recently.  ...  The implementation strategy for cooperative spectrum sensing with improved energy detection technique is discussed.  ...  Cognitive radio networks (CRNs) operate in an open wireless environment with random access to existing cellular and mobile communication networks [2] .  ... 
doi:10.33564/ijeast.2020.v04i12.070 fatcat:wokwkxuox5etfnu7bv6xcjqc4e

Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security

Javier Blesa, Alvaro Araujo, Elena Romero, Octavio Nieto-Taladriz
2013 International Journal of Distributed Sensor Networks  
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor  ...  Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such  ...  Physical-Layer Security Approaches The physical-layer security in CWSN is a new area where the investigation is in a very early state.  ... 
doi:10.1155/2013/834547 fatcat:2jhlxvj22vef3ifiiblhnjuija

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  Fig. 6 : 6 Relay-aided cooperative approaches for physical layer security with an external eavesdropper. Fig. 7 : 7 Two-hop MIMO network with trusted relay and external eavesdropper.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam
« Previous Showing results 1 — 15 out of 950 results