… layersecurity in multiuser wirelessnetworks. The essential premise of physical layersecurity is … Readers interested in going beyond the treatment of physical layersecurity offered in this …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… specific areas of security researches. Reference [160] discussed both physical layer and upper layersecurity issues in cognitive radio networks by introducing security threats and their …
HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
… channel (the so-called wireless physical layer). These results are … Although not focusing on wirelessnetworks per se, this work … scale and particularly in the context of wirelessnetworks. …
… tographic keys in the 5G network. Given the potential of physical layersecurity for the 5G era… 5G for achieving a high security level at the physical layer. Among the various technologies, …
… security of IEEE 802.11 networks? So far, security professionals have advised using upper-layer … That remains a good idea, but you must use whatever link-layersecurity you have as …
C Karlof, N Sastry, D Wagner - … of the 2nd international conference on …, 2004 - dl.acm.org
… secure. Using these primitives, we design a lightweight and efficient linklayersecurity protocol that is tailored to sensor networks. … the value of a link-layersecurity system comes from the …
N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
… works emphasize the features of high mobility and on-demand deployment to enhance security from the physical layer. Unlike the most existing literature on wireless PHY layersecurity …
… by recent developments in physical-layersecurity and stochastic geometry, we aim to characterize the fundamental limits of secure communication in wirelessnetworks. Based on a …
Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
… Third, we discuss the emerging physical-layersecurity in wireless … security, artificial-noise-aided security, security-oriented beamforming, security-oriented diversity, and physical-layer …