Eavesdropping area for evaluating the security of wireless communications

X Zhong, C Fan, S Zhou - China Communications, 2022 - ieeexplore.ieee.org
Compared with wired communication, the wireless communication link is more vulnerable to
be attacked or eavesdropped because of its broadcast nature. To prevent eavesdropping …

Eavesdropping activities in wireless networks: Impact of channel randomness

X Li, HN Dai, Y Wang, H Wang - TENCON 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
This paper presents a novel analytical model to investigate the eavesdropping attacks in
wireless networks in the presence of channel randomness with emphasis on the shadow …

Secrecy analysis with MRC/SC-based eavesdropper over heterogeneous channels

DD Tran, DB Ha, V Tran-Ha, EK Hong - IETE Journal of Research, 2015 - Taylor & Francis
In the perspective of information-theoretical security, inspired by the heterogeneity between
legal and illegal channels, we consider the physical layer secrecy performance of a novel …

Ae-shelter: An novel anti-eavesdropping scheme in wireless networks

X Li, HN Dai, Q Wang… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
To protect confidential communications from eavesdropping attacks in wireless networks, we
propose a novel anti-eavesdropping scheme named AE-Shelter. In our proposed scheme …

On the average secrecy outage rate and average secrecy outage duration of wiretap channels with rician fading

M Abughalwa, A Omri, MO Hasna - 2018 14th International …, 2018 - ieeexplore.ieee.org
In this paper, we study important physical layer security metrics over wiretap channels with
Rician fading. We derive the average secrecy outage rate (ASOR) expression to quantify the …

Secrecy rate analysis against aerial eavesdropper

X Yuan, Z Feng, W Ni, Z Wei, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies the threat that an aerial eavesdropper can pose to terrestrial wireless
communications, from an information-theoretic point of view. The achievable ergodic and the …

Unified Analysis of Secrecy Capacity Over N* Nakagami Cascaded Fading Channel

R Singh, M Rawat - 2018 18th International Symposium on …, 2018 - ieeexplore.ieee.org
With fast growth of wireless services, there is a need to investigate the performance of a
confidential communication through the wireless fading channel. In this work, a study is …

A sophisticated anti-eavesdropping strategy

A Garnaev, W Trappe - IEEE Wireless Communications Letters, 2022 - ieeexplore.ieee.org
Wireless networks are susceptible to malicious attacks, especially those involving
eavesdropping. In this letter, we consider a new type of anti-eavesdropping strategy which …

An analytical model on eavesdropping attacks in wireless networks

X Li, HN Dai, Q Zhao - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
This paper concerns the eavesdropping problem from the eavesdroppers' perspective,
which is new since most of previous studies only concentrate on the good nodes. We …

Secrecy capacity over correlated log-normal fading channel

MZI Sarkar, T Ratnarajah - 2012 IEEE International Conference …, 2012 - ieeexplore.ieee.org
This paper is concerned with the study of secrecy capacity for the log-normal fading channel
in which the main channel is correlated with the eavesdropper channel. Perfect secrecy is …