Detecting arbitrary attacks using continuous secured side information in wireless networks

R Cao - IEEE Access, 2017 - ieeexplore.ieee.org
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay
network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding …

Detecting Byzantine Attacks for Gaussian Two-Way Relay System

R Cao - arXiv preprint arXiv:1612.01707, 2016 - arxiv.org
This paper focuses on Byzantine attack detection for Gaussian two-way relay network. In this
network, two source nodes communicate with each other with the help of an amplify-and …

Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …

Limitations of generating a secret key using wireless fading under active adversary

M Zafer, D Agrawal, M Srivatsa - IEEE/ACM Transactions on …, 2012 - ieeexplore.ieee.org
Recently, many research studies have explored the use of wireless fading to generate an
information-theoretic shared secret key over an open wireless channel. While this line of …

On Study of physical-layer attack detection for large volumes of data

R Cao, Y Lu - 2017 IEEE Second International Conference on …, 2017 - ieeexplore.ieee.org
We consider Byzantine attack detection for Gaussian two-way relay network which carries
large volumes of data. Two source nodes communicate with each other with the help of an …

Securing wireless systems via lower layer enforcements

Y Chen, W Xu, W Trappe, Y Zhang, Y Chen… - … Systems: Lower-layer …, 2009 - Springer
In this chapter we present the viewpoint that there are new modalities for securing wireless
systems that can turn the nature of the wireless medium from a disadvantage into an …

Secret key generation in the two-way relay channel with active attackers

H Zhou, LM Huie, L Lai - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
Most of the existing work on key generation from wireless fading channels requires a direct
wireless link between legitimate users so that they can obtain correlated observations from …

Physical-layer secret key generation with colluding untrusted relays

CDT Thai, J Lee, TQS Quek - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
In this paper, we propose a physical-layer secret key generation scheme for multiantenna
legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas …

Physical-layer secret and private key generation in wireless relay networks with correlated eavesdropping channels

P Xu, J Yang, G Chen, Z Yang, Y Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the performance of key generation between two nodes assisted by a
relay in the presence of correlated eavesdropping channels. A cooperative jamming scheme …

Strong secrecy in bidirectional broadcast channels with confidential messages

RF Wyrembelski, M Wiese… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
To increase the spectral efficiency of future wireless networks, it is important to wisely
integrate multiple services at the physical layer. Here the efficient integration of confidential …