2010
DOI: 10.1155/2009/404061
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Physical Layer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 0 publications
0
17
0
Order By: Relevance
“…5 In short, in literature, various subtle jamming techniques, and corresponding anti-jamming solutions, were implemented extensively; 3,6 however, the relevant terms that to fully qualify and also to evaluate the success rates of communication, while employing these techniques, are achieved through the theoretical computations that have a high aspect in measurements. 6,7 As examined in previous studies, [8][9][10] information security is still the main issue in wireless communication, the security mechanisms such as applying encryption, authentication, and security management, [11][12][13] have some great security contributions against several vulnerabilities but are limited to applications at the physical layer. 4 Therefore, among other solutions, information-theoretic security is one of the solutions employed to evaluate the wireless channel secrecy, considering as a part of physical layer security.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…5 In short, in literature, various subtle jamming techniques, and corresponding anti-jamming solutions, were implemented extensively; 3,6 however, the relevant terms that to fully qualify and also to evaluate the success rates of communication, while employing these techniques, are achieved through the theoretical computations that have a high aspect in measurements. 6,7 As examined in previous studies, [8][9][10] information security is still the main issue in wireless communication, the security mechanisms such as applying encryption, authentication, and security management, [11][12][13] have some great security contributions against several vulnerabilities but are limited to applications at the physical layer. 4 Therefore, among other solutions, information-theoretic security is one of the solutions employed to evaluate the wireless channel secrecy, considering as a part of physical layer security.…”
Section: Introductionmentioning
confidence: 99%
“…For example, a jammer intends to place its antenna particularly directed toward the receiver and tries to demodulate the coming signals, hence getting the baseband signals successfully. A similar case may be possible while employing encryption schemes, for example, if the jammer has unlimited power to break the encryption codes using some potential cryptanalysis schemes, 7,12 consequently it can obtain the original modulated bits. 4,7 However, given the definition of Shannon, 15 the perfect secrecy can be achieved in wireless transmission, if the unknown entity is not successful in deciphering the spread code, or the signals are similar to noise, or even the presence of inexhaustible computational power.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, security is an important issue in WIPT. Recently, physical layer security (PLS) technologies [16] have attracted a lot of attentions due to the potentials to ensure highly secure communications by exploiting some physical properties of wireless channels. Based on the PLS technologies, a very limited number of research works have considered secure communication in WIPT [17]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…While several established protection mechanisms such as cryptography-based techniques and wireless intrusion prevention systems exist, each method has its own weaknesses and is susceptible to failure under different circumstances [2][3][4]. The resulting uncertainties have led to a significant paradigm shift in the design and implementation of wireless security in recent times, where an increasingly cross-layer approach is being pursued to protect wireless networks [5][6][7][8][9][10]. One such avenue for security has been to use the physical layer information to protect against intruders and attackers.…”
Section: Introductionmentioning
confidence: 99%