Z Qu, R Duan, X Han, S Zhao, Y Liu… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The channel state information (CSI) has been extensively studied in the literature to facilitate authentication in wireless networks. The less focused is a systematic attack model to …
In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio …
Y Pan, Y Zheng, M Li - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and …
In the previous two decades, cybersecurity risks and challenges in communications networks, especially in wireless networks, have increased tremendously. Wireless networks …
Providing higher throughput, lower latency, and ubiquitous connectivity network services have attracted significant attention in recent years. However, this technology has some …
Secure wireless communication techniques based on physical (PHY) layer properties are promising alternatives or complements to traditional upper-layer cryptography-based …
This Knowledge Area is a review of the most relevant topics in wireless physical layer security. The physical phenomenon utilized by the techniques presented in this Knowledge …
After being widely studied in theory, physical layer security schemes are getting closer to enter the consumer market. Still, a thorough practical analysis of their resilience against …
This Knowledge Area is a review of the most relevant topics in wireless physical layer security. The physical phenomenon utilized by the techniques presented in this Knowledge …