On the physical layer security of backscatter wireless systems

W Saad, X Zhou, Z Han, HV Poor - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Backscatter wireless communication lies at the heart of many practical low-cost, low-power,
distributed passive sensing systems. The inherent cost restrictions coupled with the modest …

Security challenges in mobile ad hoc networks: A survey

A Dorri, SR Kamel, E Kheirkhah - arXiv preprint arXiv:1503.03233, 2015 - arxiv.org
MANET is a kind of Ad hoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …

Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs

B Subbiah, MS Obaidat, S Sriram, R Manoharn… - 2020 - IET
A mobile ad-hoc network (MANET) consists of set of mobile nodes and communication
devices to interact without any support of the infrastructure. Unlike wired networks, the …

Tradeoff between delay and physical layer security in wireless networks

Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Exchange of crucial and confidential information leads to the unprecedented attention on the
security problem in wireless networks. Even though the security has been studied in a …

[图书][B] Signal processing approaches to secure physical layer communications in multi-antenna wireless systems

YWP Hong, PC Lan, CCJ Kuo - 2013 - books.google.com
This book introduces various signal processing approaches to enhance physical layer
secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted …

MANET security: A survey

MM Alani - 2014 IEEE International Conference on Control …, 2014 - ieeexplore.ieee.org
Mobile Ad hoc Networks are being adopted in more and more applications in our daily life.
Mobile computing and mobile ad hoc networks in particular have become a daily need. As …

Asymptotic analysis on secrecy capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental, and …

On secure wireless communications for service oriented computing

Y Zhang, Y Shen, H Wang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Service Oriented Computing (SOC) has initially developed for the Internet, but also identified
as an appealing computing paradigm for developing applications in distributed wireless …

Secured self organizing network architecture in wireless personal networks

P Jyothirmai, JS Raj, S Smys - Wireless Personal Communications, 2017 - Springer
Secured self organizing network is an approach to computer network architecture that seeks
to address the technical issues in heterogeneous networks that may lack continuous …

Analysis of short blocklength codes for secrecy

W K. Harrison, D Sarmento, J P. Vilela… - EURASIP Journal on …, 2018 - Springer
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with
finite blocklengths over Gaussian and fading wiretap channel models and analyze their …