2008 the 28th International Conference on Distributed Computing Systems 2008
DOI: 10.1109/icdcs.2008.87
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wireless Data Networks against Eavesdropping using Smart Antennas

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
44
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(44 citation statements)
references
References 6 publications
0
44
0
Order By: Relevance
“…The novel protocol uses a four step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission; (ii) message reconciliation; (iii) common key generation via privacy amplification; and (iv) message protection with a secret key. The authors in [11] introduce an idea of using the abstraction of a virtual array of physical arrays to provide security against eavesdropping. They solve the problem that using smart antennas at higher layers for security with an intelligent consideration of MAC and security issues.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The novel protocol uses a four step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission; (ii) message reconciliation; (iii) common key generation via privacy amplification; and (iv) message protection with a secret key. The authors in [11] introduce an idea of using the abstraction of a virtual array of physical arrays to provide security against eavesdropping. They solve the problem that using smart antennas at higher layers for security with an intelligent consideration of MAC and security issues.…”
Section: Related Workmentioning
confidence: 99%
“…They solve the problem that using smart antennas at higher layers for security with an intelligent consideration of MAC and security issues. However, none of these works [9][10][11] consider the use of proactive eavesdropping to enhance network security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In a typical indoor environment, a message sent to a legitimate user will be exposed to any potential eavesdropper who is within range. The principle of physical space security is to hide the knowledge of the existence of the message from the eavesdropper rather than encrypting the contents of the message from the eavesdropper [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…In this context, beamforming can be used to restrict the eavesdroppers' access to the signals [2]- [6]. Beamforming is traditionally used to optimize the system performance such as data rate, reliability, range, etc.…”
Section: Introductionmentioning
confidence: 99%