The broadcast nature of wireless networks makes them susceptible to attacks by eavesdroppers than wired networks. Any untrusted node can eavesdrop on the medium, listen to transmissions and obtain sensitive information within the wireless network. In this paper, we propose a new mechanism which combines the advantages of two techniques namely iJam and OFDM phase encryption. Our modified mechanism makes iJam more bandwidth efficient by using Alamouti scheme to take advantage of the repetition inherent in its implementation. The adversary model is extended to the active adversary case, which has not been done in the original work of iJam and OFDM phase encryption. We propose, through a max min optimization model, a framework that maximizes th...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
In this paper, we consider deceptive friendly jammers in a half-duplex random wireless network again...
Lightweight session key agreement schemes are expected to play a central role in building Internet o...
The broadcast nature of wireless networks makes them susceptible to attacks by eavesdroppers than wi...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
This paper presents a new encryption scheme implemented at the physical layer of wireless networks e...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
As the number of connected devices and the importance of mobile communications continue to increase,...
© 2016 IEEE. In this paper, we expand the scope of PHY-layer security by investigating TX-based frie...
Physical layer security has been recently recognized as a promising new design paradigm to provide s...
This work aims at addressing two critical security issues residing in the physical layer of wireless...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
In this paper, we consider deceptive friendly jammers in a half-duplex random wireless network again...
Lightweight session key agreement schemes are expected to play a central role in building Internet o...
The broadcast nature of wireless networks makes them susceptible to attacks by eavesdroppers than wi...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that...
This paper presents a new encryption scheme implemented at the physical layer of wireless networks e...
Recently, physical layer security has been recognized as a new design paradigm to provide security i...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
Special issue on physical layer securityInternational audiencePhysical layer security is an emerging...
As the number of connected devices and the importance of mobile communications continue to increase,...
© 2016 IEEE. In this paper, we expand the scope of PHY-layer security by investigating TX-based frie...
Physical layer security has been recently recognized as a promising new design paradigm to provide s...
This work aims at addressing two critical security issues residing in the physical layer of wireless...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
In this paper, we consider deceptive friendly jammers in a half-duplex random wireless network again...
Lightweight session key agreement schemes are expected to play a central role in building Internet o...