PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks

D Shan, K Zeng, W Xiang… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
… can be exploited to enhance the wireless network security. There has been an increasing …
in wireless networks by exploiting physical layer characteristics [1]–[10]. Physical layer

Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]

S Mathur, A Reznik, C Ye, R Mukherjee… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
… In order to set the stage for how physical layer information can enhance security, we provide
a review of current wireless LAN security. Given the widespread use of the 802.11 standard, …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… Furthermore, by exploiting the physical layer features, this security … , physical layer
security presents distinctive advantages and promising prospects. Therefore, the physical layer

Physical layer security issues in interference-alignment-based wireless networks

N Zhao, FR Yu, M Li, Q Yan… - IEEE Communications …, 2016 - ieeexplore.ieee.org
… In this article, two primary attacks at the physical layer of IA-based wireless networks, jamming
and eavesdropping, were studied. First, an anti-jamming IA scheme is proposed in which …

Wireless physical-layer identification: Modeling and validation

W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
physical layer feature cannot be modified without significant effort. Therefore, the WPLI technique
is deemed as a promising wireless security solution, if the physical layer … of-art wireless

Physical layer service integration in wireless networks: Signal processing challenges

RF Schaefer, H Boche - IEEE Signal Processing Magazine, 2014 - ieeexplore.ieee.org
… the physical layer so that the broadcast nature of the wirelesswireless networks since
such systems are inherently vulnerable to eavesdropping due to the open nature of the wireless

Impact of the physical layer modeling on the accuracy and scalability of wireless network simulation

E Ben Hamida, G Chelius, JM Gorce - Simulation, 2009 - journals.sagepub.com
… simulators are still based on inaccurate and heterogeneous PHY … the physical layer modeling
issue and we investigate its impact on the accuracy and the complexity of wireless network

Safeguarding wireless network with UAVs: A physical layer security perspective

Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
… Considering the above two new UAV security issues in future wireless networks, this article
… from a physical-layer (PHY) design perspective. Note that PHY security has been extensively …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… guarantees based on and aided by the physical medium in which the communication takes
place, ie, the channel. We will consider wireless communication channels only. Further, we …

Physical-layer security in stochastic wireless networks

PC Pinto, J Barros, MZ Win - 2008 11th IEEE Singapore …, 2008 - ieeexplore.ieee.org
… for wireless channels is introduced in [11]. So far, most results in physical-layer security …
In this paper, we are interested in the behaviour of large-scale wireless networks. The spatial …