Y Huo, Y Tian, L Ma, X Cheng… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based …
Securing communications is a challenging task. A first attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to …
Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap …
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to …
D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer …
This paper presents a thorough experimental study on key generation principles, ie, temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …
A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure communication against an adversary with unlimited computational power. Rooted in …
The industrial environment poses strict requirements to the infrastructure of good and service production and delivery. Communications are not an exception. Wired systems …