Literature DB >> 28028211

Wireless physical layer security.

H Vincent Poor1, Rafael F Schaefer2.   

Abstract

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

Keywords:  information theory; security; wireless networks

Year:  2016        PMID: 28028211      PMCID: PMC5224364          DOI: 10.1073/pnas.1618130114

Source DB:  PubMed          Journal:  Proc Natl Acad Sci U S A        ISSN: 0027-8424            Impact factor:   11.205


  10 in total

1.  QnAs with H. Vincent Poor.

Authors:  Farooq Ahmed
Journal:  Proc Natl Acad Sci U S A       Date:  2017-01-26       Impact factor: 11.205

2.  Physical layer security in light-fidelity systems.

Authors:  Zhenyu Zhang; Anas Chaaban; Lutz Lampe
Journal:  Philos Trans A Math Phys Eng Sci       Date:  2020-03-02       Impact factor: 4.226

3.  Graph Layer Security: Encrypting Information via Common Networked Physics.

Authors:  Zhuangkun Wei; Liang Wang; Schyler Chengyao Sun; Bin Li; Weisi Guo
Journal:  Sensors (Basel)       Date:  2022-05-23       Impact factor: 3.847

4.  Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks.

Authors:  Kyusung Shim; Nhu Tri Do; Beongku An
Journal:  Sensors (Basel)       Date:  2017-02-15       Impact factor: 3.576

5.  Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network.

Authors:  Alma E Guerrero-Sanchez; Edgar A Rivas-Araiza; Jose Luis Gonzalez-Cordoba; Manuel Toledano-Ayala; Andras Takacs
Journal:  Sensors (Basel)       Date:  2020-05-14       Impact factor: 3.576

6.  Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying.

Authors:  Lingfeng Shen; Ning Wang; Xiang Ji; Xiaomin Mu; Lin Cai
Journal:  Sensors (Basel)       Date:  2019-08-06       Impact factor: 3.576

7.  Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.

Authors:  Tom Vergoossen; Robert Bedington; James A Grieve; Alexander Ling
Journal:  Entropy (Basel)       Date:  2019-04-10       Impact factor: 2.524

8.  On the secrecy performance of transmit-receive diversity and spatial multiplexing systems.

Authors:  Kiattisak Maichalernnukul
Journal:  PeerJ Comput Sci       Date:  2019-04-22

Review 9.  An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels.

Authors:  Long Kong; Yun Ai; Lei Lei; Georges Kaddoum; Symeon Chatzinotas; Björn Ottersten
Journal:  EURASIP J Wirel Commun Netw       Date:  2021-12-04

10.  Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks.

Authors:  Kyusung Shim; Toan-Van Nguyen; Beongku An
Journal:  Sensors (Basel)       Date:  2019-12-11       Impact factor: 3.576

  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.