Eavesdropping activities in wireless networks: Impact of channel randomness

X Li, HN Dai, Y Wang, H Wang - TENCON 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
This paper presents a novel analytical model to investigate the eavesdropping attacks in
wireless networks in the presence of channel randomness with emphasis on the shadow …

An analytical model on eavesdropping attacks in wireless networks

X Li, HN Dai, Q Zhao - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
This paper concerns the eavesdropping problem from the eavesdroppers' perspective,
which is new since most of previous studies only concentrate on the good nodes. We …

On modeling eavesdropping attacks in wireless networks

X Li, J Xu, HN Dai, Q Zhao, CF Cheang… - Journal of Computational …, 2015 - Elsevier
This paper concerns the eavesdropping attacks from the eavesdroppers' perspective, which
is new since most of current studies consider the problem from the good nodes' perspective …

[PDF][PDF] Eavesdropping Attacks in Wireless Ad Hoc Networks under a Shadow Fading Environment

X Li, HN Dai, Q Zhao, Q Wang - … of the 2014 International Conference on …, 2014 - Citeseer
This paper concerns the eavesdropping attacks in wireless ad hoc networks under a
shadow fading environment. Most of previous studies have only concentrated on protecting …

[图书][B] Physical layer security of wireless transmissions over fading channels

S Blanc - 2016 - search.proquest.com
The open nature of the wireless medium makes the wireless communication susceptible to
eavesdropping attacks. In addition, fading and shadowing significantly degrade the …

Eavesdropping security in wireless ad hoc networks with directional antennas

Q Wang, HN Dai, Q Zhao - 2013 22nd Wireless and Optical …, 2013 - ieeexplore.ieee.org
The eavesdropping security of wireless ad hoc networks has attracted considerable
attention recently. However, most of current studies only consider OMN networks, where …

Defending against eavesdropping attack leveraging multiple antennas in wireless networks

Y Zou, J Zhu, B Zheng - 2013 8th International Conference on …, 2013 - ieeexplore.ieee.org
Wireless communication is vulnerable to eavesdropping attack due to the broadcast nature
of radio propagation. In recent years, physical-layer security is emerging as a promising …

Wireless Security with Beamforming Technique

Y Zhang - arXiv preprint arXiv:1609.03629, 2016 - arxiv.org
This thesis focuses on the wireless security in the physical layer with beamforming
technique. One of the emerging areas is the security enhancement in the physical layer …

Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference

JM Moualeu, W Hamouda, F Takawira - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, the joint effect of fading and co-channel interference on the secrecy
performance of a wireless communications system is studied. Considering a practical setting …

Ae-shelter: An novel anti-eavesdropping scheme in wireless networks

X Li, HN Dai, Q Wang… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
To protect confidential communications from eavesdropping attacks in wireless networks, we
propose a novel anti-eavesdropping scheme named AE-Shelter. In our proposed scheme …