JR Jiang - 2020 3rd IEEE International Conference on …, 2020 - ieeexplore.ieee.org
… There are different services using physicallayer security such … This paper focuses on physical layer authentication (PLA) … We are thus motivated to review physicallayer authentication …
… BLE operates at 1Mbps rate on its physicallayer, while its application layer can handle only 236.7 … The physicallayer provides an interface between the physical data service and the …
A Soni, R Upadhyay, A Kumar - Physical Communication, 2019 - Elsevier
… In this paper, we proposed a wireless physicallayer key generation approach based on pre-processing the RSS signals of beacons exchanged between Alice and Bob using moving …
H Jung, IH Lee - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the rapid proliferation of the Internet of Things (IoT), small devices in various applications generate, process, and exchange security and safety-critical data as well as privacy-…
… for the attacker, by taking advantage of insufficient resilience against physical manipulation and their insufficient physical security. In Physicallayer, we face relay attacks as well as the …
O Bello, S Zeadally, M Badra - Ad Hoc Networks, 2017 - Elsevier
… The PHYlayer supports communication in the 10 KHz–490 KHz band using Orthogonal Frequency Division Multiple Access (OFDM) to provide robust communication over the harsh …
… that manages and controls access to limited Physicallayer resources. The OSI model … physical layers of the standards related to the Internet of Things, present the various physicallayer …
… models targeting the physicallayer make it challenging to address these security deficiencies only in software [1]–[4]. This work pro vides an overview of physicallayer threat models …
The physical-layer security (PLS) of wireless networks has witnessed significant attention in next-generation communication systems due to its potential toward enabling protection at …