With the development of wireless networks, attacks such as personal information hijacking through packet sniffing are increasing. However, encryption techniques to protect data are not sufficient to prevent this. In this paper, we propose a secret communication system that can not be tapped using surplus resources of wireless network lower layer. To make the communication untappable and exchange hidden messages exclusively between the sender and receiver, our system utilizes the OFDM padding mechanism of the PHY layer and the CRC error mechanism of the MAC layer. General network receivers immediately discard OFDM padding bits at PHY layer and corrupted packets by CRC error at MAC layer, however, we change the role of each low layers. We i...
The growth of networks, both wired and wireless, has brought with it a tremendous increase in flexib...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
ABSTRACT- Jamming is typically referred as an intentional interference attack which is left due to t...
Our world of people and objects is on the verge of transforming to a world of highly-interconnected ...
People sometimes need to communicate directly with one another while concealing the communication it...
This paper introduces a concept of increasing securing in the Physical layer (PHY) of wireless commu...
This paper presents a new encryption scheme implemented at the physical layer of wireless networks e...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
International audienceWhile Wireless communication (WLC) enhances the user mobility and extends the ...
Abstract—Securing wireless communication remains challeng-ing in dynamic mobile environments due to ...
Developing of capability to launch attacks based on situational awareness of the communication envir...
The hidden terminal problem is known to degrade the throughput of wireless networks due to collision...
The growth of networks, both wired and wireless, has brought with it a tremendous increase in flexib...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
ABSTRACT- Jamming is typically referred as an intentional interference attack which is left due to t...
Our world of people and objects is on the verge of transforming to a world of highly-interconnected ...
People sometimes need to communicate directly with one another while concealing the communication it...
This paper introduces a concept of increasing securing in the Physical layer (PHY) of wireless commu...
This paper presents a new encryption scheme implemented at the physical layer of wireless networks e...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
A major challenge in securing wireless applications and services is the inherent vulnerability of ra...
Over time, the use of wireless technologies has significantly increased due to bandwidth improvement...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
International audienceWhile Wireless communication (WLC) enhances the user mobility and extends the ...
Abstract—Securing wireless communication remains challeng-ing in dynamic mobile environments due to ...
Developing of capability to launch attacks based on situational awareness of the communication envir...
The hidden terminal problem is known to degrade the throughput of wireless networks due to collision...
The growth of networks, both wired and wireless, has brought with it a tremendous increase in flexib...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
ABSTRACT- Jamming is typically referred as an intentional interference attack which is left due to t...