Physical-layer security in distributed wireless networks using matching theory

S Bayat, RHY Louie, Z Han… - … Forensics and Security, 2013 - ieeexplore.ieee.org
… in wireless communication networks. His research interests include wireless resource
management, heterogeneous networks, cognitive radio, game theory, and physical-layer security. …

Physical layer security in intelligently connected vehicle networks

X Luo, Y Liu, HH Chen, Q Guo - IEEE Network, 2020 - ieeexplore.ieee.org
… (V2V) communication networks can no longer satisfy today’s vehicular communication
require… (5G) and beyond network infrastructures, the next generation vehicle networks, called …

Identity based key distribution framework for link layer security of AMI networks

V Seferian, R Kanj, A Chehab… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… In [8], we propose a secure and scalable identity based key distribution framework for the
link layer security of wireless mesh-based AMI. It employs Identity based NonInteractive Key …

Safeguarding the ultra-dense networks with the aid of physical layer security: A review and a case study

Y Wang, Z Miao, L Jiao - IEEE Access, 2016 - ieeexplore.ieee.org
… future communication networks. More importantly, the physical layer security technologies
… demands on the processing ability of communication entities. This significantly reduces the …

Practical aspects of physical and MAC layer security in visible light communication systems

GJ Blinowski - International Journal of Electronics and …, 2016 - infona.pl
secure communication method. In this work we focus on security aspects of VLC communication,
starting from basic physical characteristics of the communication channel. We analyze …

Safeguarding wireless network with UAVs: A physical layer security perspective

Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
… a physical-layer (PHY) design perspective. Note that PHY security has been extensively …
eavesdropping and/ or jamming attacks in terrestrial communication networks (eg, [3, 4, …

Secure communication in stochastic wireless networks—Part II: Maximum rate and collusion

PC Pinto, J Barros, MZ Win - … Information Forensics and Security, 2011 - ieeexplore.ieee.org
… introduced the intrinsically secure communications graph (iS-graph)—a random graph which
describes the connections that can be securely established over a large-scale network. We …

Physical layer security-aware routing and performance tradeoffs in ad hoc networks

Y Xu, J Liu, Y Shen, X Jiang, N Shiratori - Computer Networks, 2017 - Elsevier
… quality of service (QoS) caused by improving security is largely uninvestigated. As a step
to … layer security-aware routing and performance tradeoffs in a multi-hop ad hoc network. …

Physical layer security for wireless sensor networks

J Choi, J Ha, H Jeon - … , and Mobile Radio Communications  …, 2013 - ieeexplore.ieee.org
… While we only focus on secure communication schemes for distributed detection as examples
of physical layer security techniques for WSNs in this paper, there are also other security

Physical layer security in wireless smart grid

EK Lee, M Gerla, SY Oh - IEEE Communications Magazine, 2012 - ieeexplore.ieee.org
… vulnerability in terms of network security. This work addresses physical layer security, a topic
that … communication network. Neighboring masters (including an aggregator) exchange any …