Crypto-aided MAP test for low-latency detection of false data in short packets

SW Kim, X Liu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Cryptography has been used as the first line of defense to ensure data integrity. However, it
incurs a significant overhead for short packets which represent the most common form of …

Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers

CDT Thai, TT Tran, DT Huynh - Wireless Networks, 2023 - Springer
In this paper, we consider the problem of multiple active and full-duplex (FD) attackers in
physical-layer security of wireless communications. The attackers can eavesdrop the …

Malicious relay detection using sentinels: A stochastic geometry framework

U Tefek, A Tandon, TJ Lim - Journal of Communications and …, 2020 - ieeexplore.ieee.org
Next generation wireless networks are under high risk of security attacks due to increased
connectivity and information sharing among peer nodes. Some of the nodes could …

Security for two-way untrusted relay against constant and reactive jamming with fixed signals

C Thai, VNQ Bao, DT Huynh - REV Journal on Electronics and …, 2021 - rev-jec.org
Active attacking in physical-layer security has not been significantly studied while potentially
causing serious consequences for the legitimate networks. In this paper, we propose a novel …

Attack detection for massive MIMO relay system

R Cao, Y Wan, H Yu, Y Lu, H Gao - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article focuses on a two-hop relay system, where a potential malicious single-antenna
relay may forward altered symbols to a base station (BS) equipped with massive antennas …

[PDF][PDF] Physical Layer Security of In-Home PLC Systems: Analysis Based on a Measurement Campaign

H ˆAndrei Camponogara, MV Ribeiro - ieeexplore.ieee.org
(PLS) of a broadband in-home power line communication (PLC) system when a malicious
and passive PLC device tries to eavesdrop private information sent by a PLC transmitter to a …

Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against iid Attacks

X Zheng, R Cao, H Gao, Y Lu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This paper considers channel coding problems with the requirement of guaranteeing
information integrity in the presence of malicious relays (MRs). The proved random channel …