Physical layer security by exploiting interference and heterogeneous signaling

AA Nasir, HD Tuan, HH Nguyen… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) aims to protect end users who are equipped with low-
complexity receivers for which implementing cryptographic algorithms for security purposes …

Wireless network intrinsic secrecy

A Rabbachin, A Conti, MZ Win - IEEE/ACM Transactions on …, 2014 - ieeexplore.ieee.org
Wireless secrecy is essential for communication confidentiality, health privacy, public safety,
information superiority, and economic advantage in the modern information society …

Efficient wireless security through jamming, coding and routing

M Ghaderi, D Goeckel, A Orda… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
There is a rich recent literature on how to assist secure communication between a single
transmitter and receiver at the physical layer of wireless networks through techniques such …

Physical layer security in wireless networks: A tutorial

YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
Wireless networking plays an extremely important role in civil and military applications.
However, security of information transfer via wireless networks remains a challenging issue …

Tree formation with physical layer security considerations in wireless multi-hop networks

W Saad, X Zhou, B Maham, T Basar… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Physical layer security has emerged as a promising technique that complements existing
cryptographic approaches and enables the securing of wireless transmissions against …

A game with randomly distributed eavesdroppers in wireless ad hoc networks: A secrecy EE perspective

Y Kwon, X Wang, T Hwang - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
We study energy-efficient secure communication using the combined approach of game
theory and stochastic geometry in a large-scale wireless network, where legitimate …

Buffer-aided secure relay networks with SWIPT

J Ren, X Lei, PD Diamantoulakis… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we propose the use of data and energy buffering in wireless powered relays,
while we also design scheduling schemes, with the aim to increase the secrecy throughput …

[图书][B] Physical layer security in wireless cooperative networks

L Wang - 2018 - Springer
Wireless communication is one of important means for connecting everyone from anywhere
in the world at any time. Though the prevalence of wireless technologies brings many …

From secure wired networks to secure wireless networks–what are the extra risks?

B Von Solms, E Marais - Computers & Security, 2004 - Elsevier
From secure wired networks to secure wireless networks – what are the extra risks? -
ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & Books Search …

Wireless physical-layer security: The case of colluding eavesdroppers

PC Pinto, J Barros, MZ Win - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
We consider the fundamental security limits of stochastic wireless networks in the presence
of colluding eavesdroppers. By establishing a direct connection with the single-input …