Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… the physical layer security in the presence of an active … In this paper, the adversary intends
to optimize its transmit … on the links between the active eavesdropper and other legitimate …

How to manage resources to provide physical layer security: Active versus passive adversary?

MR Abedi, N Mokari, H Saeedi - Physical Communication, 2018 - Elsevier
… The passive adversaries are half duplex and only … active adversaries are full duplex and
able to jam and eavesdrop simultaneously. Since the channel information between adversaries

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
… array of adversary modes in which the adversary is more active and, frankly, more clever. …
the context of physical layer security, we must nonetheless strive to strengthen our adversarial

Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks

D Kapetanovic, G Zheng… - IEEE Communications …, 2015 - ieeexplore.ieee.org
… challenges of physical layer security integration in MaMIMO … We then review a pilot
contamination scheme that actively … methods from literature that detect active attacks on MaMIMO. …

RAV: Relay aided vectorized secure transmission in physical layer security for Internet of Things under active attacks

N Zhang, R Wu, S Yuan, C Yuan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… In PHY security, channel state information (CSI) estimated through reverse pilot training is …
is also vulnerable to adversaries. An adversary can actively launch pilot contamination attacks …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
adversaries may be too weak, but malicious adversaries may conversely be too strong to
defend against. They introduced the notion of a “covert” adversary which is an active adversary

[HTML][HTML] Protecting physical layer secret key generation from active attacks

M Mitev, A Chorti, EV Belmega, HV Poor - Entropy, 2021 - mdpi.com
… phase between Alice and Bob could allow an adversary (Mallory) to estimate the channels
Alice… , ensuring that the extracted key bits are secret from both active and passive adversaries. …

Limitations of generating a secret key using wireless fading under active adversary

M Zafer, D Agrawal, M Srivatsa - IEEE/ACM Transactions on …, 2012 - ieeexplore.ieee.org
… the adversary at the physical layer, thus protecting themselves from disruption attacks. Beyond
physical layer security, … many higher-layer security mechanisms including data encryption. …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
… /or secure communications in the presence of adversarial … to account for the presence of an
active eavesdropper in [179]-[… same rate as in the passive-adversary case, or such secret-key …

Manipulating adversary's belief: A dynamic game approach to deception by design for proactive network security

K Horák, Q Zhu, B Bošanský - Decision and Game Theory for Security: 8th …, 2017 - Springer
… stochastic games to reason about active deception in network security, where the defender
… located in the deeper layers of the network. In our case, the second layer consists of data …