A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Cooperative Jamming Applied to Physical Layer Security
2015
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security. ...
Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory. ...
PHYSICAL LAYER SECURITY AND COOPERATIVE JAMMING
A. ...
doi:10.1109/icuwb.2015.7324413
dblp:conf/icuwb/AtallahKK15
fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q
Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network
2020
International Journal of Electrical and Computer Engineering (IJECE)
The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device ...
For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). ...
For satisfying, an opportunistic spectrum access (OSA) model with adjustable spectrum access probability is required at MAC layer. ...
doi:10.11591/ijece.v10i3.pp3284-3294
fatcat:qemoi367tfbydmiynr3ktnkd5e
Anomalous spectrum usage attack detection in cognitive radio wireless networks
2011
2011 IEEE International Conference on Technologies for Homeland Security (HST)
Another example is a smart jammer, who can scan the spectrum and jam channels selectively. ...
In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation. ...
With the collected physical and network layer information, accurate spectrum awareness across the network can be achieved and discrepancy between the information from the two layers can be identified. ...
doi:10.1109/ths.2011.6107900
fatcat:dg7uznyvpvey3j6hlz2iuhljlq
Wireless Communication, Sensing, and REM: A Security Perspective
2021
IEEE Open Journal of the Communications Society
INDEX TERMS 5G, 6G, cryptography, joint radar and communication (JRC), physical layer security, radio environment mapping (REM), REM security, sensing security, vehicle-to-everything (V2X) communication ...
Sections IV, V, and VI discuss the exploratory, manipulation, disruption attacks with solutions, respectively. ...
and possible physical layer solutions for securing REM and utilizing REM for security. ...
doi:10.1109/ojcoms.2021.3054066
fatcat:klhorbflvvdrlkqyndctn3lwtq
On jamming detection methods for satellite Internet of Things networks
2021
International Journal of Satellite Communications And Networking
Specifically, in this paper, we address a class of jamming attacks in which the adversary uses the underlying knowledge of the satellite physical and access protocol to increase the jamming impact. ...
More specifically, we introduce a simple (counting) jamming detection method along with numerical results for realistic system parameters, which confirms system design vulnerability as well as how the ...
denial of service attack by jamming the physical or access layer. ...
doi:10.1002/sat.1431
fatcat:xzbmvkhkhbcm5hajo3qyhmhzrq
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
2022
International Journal of Communication Networks and Information Security
There is no comprehensive review paper available on the strategies for medium access control (MAC), routing and transport layer protocols, and the appropriate representative solutions for CRNs. ...
This paper would serve as a good comprehensive review and analysis of the strategies for MAC, routing and transport protocols and security issues for CRNs as well as would lay a strong foundation for someone ...
informs the physical layer to sense for available channels and prepare for a channel switch. ...
doi:10.17762/ijcnis.v5i1.249
fatcat:vtw4ktuovbawnexgglej6jncxu
Table of contents
2020
IEEE Transactions on Communications
Haas 1675 Physical Layer Security A Secure and Robust Frequency and Time Diversity Aided OFDM-DCSK Modulation System Not Requiring Channel State Information ............................................ ...
Moharir 1593 Rate Selection for Wireless Random Access Networks Over Block Fading Channels ..................................... ........................................................................ ...
doi:10.1109/tcomm.2020.2974334
fatcat:rcatbpjhunc7jeb7e3ynpx7fl4
Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art
2012
Journal of Cyber Security and Mobility
Physical layer security (PLS) is the imminent security guarantee for the cooperative communication. ...
One morning, we were waiting for our college bus. The Wipro industry bus was slowly passing nearby us looking for its employees. ...
The authors have projected a topology control mechanism with authentication for throughput enhancement by combining higher layer security techniques with physical layer security techniques for CWC. ...
doi:10.13052/jcsm2245-1439.1235
fatcat:tb7kdqbyrfdaxghm24ytvb6vza
Table of contents
2019
IEEE Transactions on Communications
Alouini 2245 Physical Layer Security Learning-Aided Physical Layer Authentication as an Intelligent Process ............ H. Fang, X. ...
Cognitive Radio Systems
Source-Channel Coding Improper Gaussian Signaling for Multiple-Access Channels in Underlay Cognitive Radio ................................ ................................... ...
doi:10.1109/tcomm.2019.2897183
fatcat:lzbqxlv4srhzpdrrltonxno5oi
Node Selection Algorithm for Routing Protocols in VANET
2016
International Journal of Advanced Science and Technology
It is mainly used for hop to hop communication, channel access contention. VANET is to provide safety for passenger and drivers on the road. ...
Giving media service around VANET might need a QOS aware routing protocol that always has to calculate the accessible resources. ...
Being a wireless network, Issues in VANET domain include random packet loss in transport layer and in data link layer for a given end to end connection. ...
doi:10.14257/ijast.2016.96.05
fatcat:uiqyhe4bw5ce3pyaby4ezppdeu
Editorial: Wireless Communications and Networks for 5G and Beyond
2019
Journal on spesial topics in mobile networks and applications
In the same research stream of physical layer security, the authors of the second paper study BA Physical Layer Network Coding (PNC) Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission ...
The underlying idea of the proposed dynamic key encryption scheme is to leverage the random and dynamic nature of the physical communication channel towards reaching a high security level with minimal ...
In the same research stream of physical layer security, the authors of the second paper study BA Physical Layer Network Coding (PNC) Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission ...
doi:10.1007/s11036-019-01232-8
fatcat:acmfqfwdmnbzxelxxn6m2fnlkq
Physical-Layer Security in 6G Networks
2021
IEEE Open Journal of the Communications Society
In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments. ...
To trust the services provided by such network, security is a mandatory feature by design. ...
Integrating physical layer with cybersecurity is the key to face security challenges of future 6G networks. ...
doi:10.1109/ojcoms.2021.3103735
fatcat:kcntnplyqnc45bp5i5wceiwk4m
SPECTRUM SENSING AND SECURITY CONCERNS IN SOFTWARE-DEFINED RADIO AND COGNITIVE RADIO NETWORKS
2020
International Journal of Engineering Applied Sciences and Technology
However, requirement for providing adequate level of security is the main challenge for wide deployment of CRNs. The issues of security and robustness in CRNs have gained momentum recently. ...
The implementation strategy for cooperative spectrum sensing with improved energy detection technique is discussed. ...
Cognitive radio networks (CRNs) operate in an open wireless environment with random access to existing cellular and mobile communication networks [2] . ...
doi:10.33564/ijeast.2020.v04i12.070
fatcat:wokwkxuox5etfnu7bv6xcjqc4e
Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security
2013
International Journal of Distributed Sensor Networks
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor ...
Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such ...
Physical-Layer Security Approaches The physical-layer security in CWSN is a new area where the investigation is in a very early state. ...
doi:10.1155/2013/834547
fatcat:2jhlxvj22vef3ifiiblhnjuija
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
Fig. 6 : 6 Relay-aided cooperative approaches for physical layer security with an external eavesdropper.
Fig. 7 : 7 Two-hop MIMO network with trusted relay and external eavesdropper. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
« Previous
Showing results 1 — 15 out of 950 results