Conventional techniques currently used for secure communications are subject to significant vulnerabilities, especially for wireless systems. Unauthorized interceptors have more computation power than ever before to record and potentially decode sensitive information, and there is very little protection against disruptive interference, i.e., jamming. Our research goals are to identify and characterize new methods using antenna design and radiation properties to increase the security of wireless networks. Two major threats are addressed in this work---jammers and eavesdroppers. The problem space outlined for the first threat is the open broadcast of the Global Positioning System (GPS), and the solution is developed from the view of a recei...
University of Minnesota Ph.D. dissertation. August 2012. Major: Computer Science. Advisor: Yongdae K...
The use of physical layer methods for improving the security of wireless links has recently become t...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Today’s trend of migrating radio devices from hardware to software provides potentials to create fle...
The emerging advances in wireless communications make it an essential component of our ever...
There are a number of studies on using directional antennas in wireless networks. Many of them conce...
International audienceThis paper investigates the secrecy connectivity probability for wireless netw...
As the number of connected devices and the importance of mobile communications continue to increase,...
The security of wireless networks and systems is becoming increasingly important as wireless devices...
This paper investigates the secrecy connectivity probability for wireless networks with transmit ant...
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to v...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
In multiple-input-multiple-output (MIMO) wireless communications, Space Shift Keying (SSK), Spatial ...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
University of Minnesota Ph.D. dissertation. August 2012. Major: Computer Science. Advisor: Yongdae K...
The use of physical layer methods for improving the security of wireless links has recently become t...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
Today’s trend of migrating radio devices from hardware to software provides potentials to create fle...
The emerging advances in wireless communications make it an essential component of our ever...
There are a number of studies on using directional antennas in wireless networks. Many of them conce...
International audienceThis paper investigates the secrecy connectivity probability for wireless netw...
As the number of connected devices and the importance of mobile communications continue to increase,...
The security of wireless networks and systems is becoming increasingly important as wireless devices...
This paper investigates the secrecy connectivity probability for wireless networks with transmit ant...
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to v...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
In multiple-input-multiple-output (MIMO) wireless communications, Space Shift Keying (SSK), Spatial ...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
University of Minnesota Ph.D. dissertation. August 2012. Major: Computer Science. Advisor: Yongdae K...
The use of physical layer methods for improving the security of wireless links has recently become t...
Physical layer security schemes for wireless communications are currently crossing the chasm from th...