Physical layer security jamming: Theoretical limits and practical designs in wireless networks

K Cumanan, H Xing, P Xu, G Zheng, X Dai… - IEEE …, 2016 - ieeexplore.ieee.org
… This article focuses on physical layer security jamming techniques based on user
cooperations and external nodes. Firstly, theoretical limits of jamming through user cooperation is …

Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
wireless communications against eavesdropping by exploiting the physical characteristics
of the wireless … of attacks against security at the physical layer of wireless systems. Next, the …

Cooperative wireless networks based on physical layer network coding

S Fu, K Lu, T Zhang, Y Qian… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
wireless network models. In this article we develop a generic wireless network design framework
based on physical layer network coding … in a cooperative network may transmit signals …

Physical layer wireless security made fast and channel independent

S Gollakota, D Katabi - 2011 Proceedings IEEE INFOCOM, 2011 - ieeexplore.ieee.org
… In this paper, we investigate a new approach to physical layer security that is independent …
PHY technique that ensures that an eavesdropper cannot even demodulate a wireless signal …

On capacity of random wireless networks with physical-layer network coding

K Lu, S Fu, Y Qian, HH Chen - IEEE Journal on Selected Areas …, 2009 - ieeexplore.ieee.org
wireless network, we … wireless network, we will prove its tighter capacity bounds. In addition,
we also derive achievable lower bounds for random wireless networks with both network

Attacks on physical-layer identification

B Danev, H Luecken, S Capkun… - … on Wireless network …, 2010 - dl.acm.org
… Figure 2: Our system consists of a wireless network with a number of wireless devices (…
: a wireless network is deployed in an area A. The network consists of N wireless devices …

Physical-layer security in distributed wireless networks using matching theory

S Bayat, RHY Louie, Z Han… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
wireless networks, security issues are primarily considered above the physical layer and are
… SYSTEM MODEL We consider a wireless network comprising of source node – destination …

Wireless physical-layer security: The case of colluding eavesdroppers

PC Pinto, J Barros, MZ Win - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
… properties of stochastic wireless networks are discussed in [… limits of physical-layer security
in wireless networks with … In large-scale wireless networks, the spatial distribution of the …

Wireless network optimization via physical layer information for smart cities

F Xiao, X Xie, Z Li, Q Deng, A Liu, L Sun - IEEE Network, 2018 - ieeexplore.ieee.org
… fine-grained wireless functions. In this article, we turn our attention to the PHY layer and
extract channel state information, which is now tractable on commodity network interface cards (…

Using the physical layer for wireless authentication in time-variant channels

L Xiao, LJ Greenstein, NB Mandayam… - … on Wireless …, 2008 - ieeexplore.ieee.org
… by two notable parallel paradigm shifts in wireless systems: (1) … of our proposed physical
layer authentication service. We … testing framework for physical layer authentication. In Section …