Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A Trust-Based predictive model for mobile ad hoc network in internet of things

W Alnumay, U Ghosh, P Chatterjee - Sensors, 2019 - mdpi.com
The Internet of things (IoT) is a heterogeneous network of different types of wireless
networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks …

6lowpan security: Avoiding hidden wormholes using channel reciprocity

KF Krentz, G Wunder - Proceedings of the 4th International Workshop on …, 2014 - dl.acm.org
6LoWPAN networks are 802.15. 4-based wireless sensor Networks that seamlessly
integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN …

Physical-layer security for the Internet of Things

C Zenger - 2017 - hss-opus.ub.ruhr-unibochum.de
Das Internet der Dinge (IoT), bei dem Kommunikationsknoten durch eingebettete
Kleinstsystemen gebildet werden, gewinnt an wirtschaftlicher Bedeutung. Durch den …

An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks

SA Sert, C Fung, R George… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring
in indoor and outdoor environments. A great deal of WSNs operates by sensing the area-of …

Detection and avoidance of wormhole attacks in connected vehicles

SS Albouq, EM Fredericks - Proceedings of the 6th ACM Symposium on …, 2017 - dl.acm.org
The routing protocol in connected vehicles (CVs) is vulnerable to wormhole attacks where
attackers can deceive legitimate nodes and purport them as if they are immediate or close …

Physical layer authentication based on BER measurement of optical fiber channel

X Wang, Y Li, Y Zhao, C Lei, H Zhang, J Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
Physical layer authentication is an important way to ensure the security of optical
communication network. We hereby propose a scheme to realize it by measuring the …

A new statistical method for wormhole attack detection in MANETs

H As' adi, A Keshavarz-Haddad… - 2018 15th International …, 2018 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are a set of mobile wireless nodes that can communicate
without the need for an infrastructure. Features of MANETs have made them vulnerable to …

Preventing relay attacks and providing perfect forward secrecy using physec on 8-bit µc

CT Zenger, M Pietersz, C Paar - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Physical Layer Security (PHYSEC) has the potential to offer substantial advantages for key
management for small resource-constrained devices. In this paper, we investigate two …

Distributed trust based routing in mobile ad-hoc networks

S Jain, JS Baras - MILCOM 2013-2013 IEEE Military …, 2013 - ieeexplore.ieee.org
Establishing trust and security in ad-hoc networks has been a long studied problem. Several
methods have been proposed for evaluation and dissemination of trust in such networks …