A survey on OFDM physical layer security
暂无分享,去创建一个
[1] Richard D. Gitlin,et al. Secure key management for 5G physical layer security , 2017, 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON).
[2] Xiuwen Liu,et al. TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[3] Junqing Zhang,et al. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.
[4] Yahya M. Al-Moliki,et al. Robust Key Generation From Optical OFDM Signal in Indoor VLC Networks , 2016, IEEE Photonics Technology Letters.
[5] J.A.C. Bingham,et al. Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.
[6] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[7] Takahiko Saba,et al. Energy Efficient Artificial Fast Fading for MISO-OFDM Systems , 2014, GLOBECOM 2014.
[8] Teng Wang,et al. Security-Coded OFDM System Based on Multiorder Fractional Fourier Transform , 2016, IEEE Communications Letters.
[9] Byung-Jae Kwak,et al. LDPC for Physical Layer Security , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[10] Kapil R. Dandekar,et al. Secure and robust symmetric key generation using physical layer techniques under various wireless environments , 2016, 2016 IEEE Radio and Wireless Symposium (RWS).
[11] Fan Li,et al. PAPR reduction based on chaos combined with SLM technique in optical OFDM IM/DD system , 2015 .
[12] Haji M. Furqan,et al. Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[13] Hanif D. Sherali,et al. Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] Qi Zhang,et al. Theory and Performance Analyses in Secure CO-OFDM Transmission System Based on Two-Dimensional Permutation , 2013, Journal of Lightwave Technology.
[17] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[18] Christof Paar,et al. Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .
[19] Xianbin Wang,et al. Secure Transmission in OFDM Systems by Using Time Domain Scrambling , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[20] H Vincent Poor,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[21] Jinho Choi,et al. Secure Index and Data Symbol Modulation for OFDM-IM , 2017, IEEE Access.
[22] Peng Ning,et al. No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[23] Yih-Chun Hu,et al. Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[24] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[25] Taesoo Kwon,et al. Design and implementation of a simulator based on a cross-layer protocol between MAC and PHY layers in a WiBro Compatible.IEEE 802.16e OFDMA system , 2005, IEEE Commun. Mag..
[26] Hüseyin Arslan,et al. Achieving secure communication through pilot manipulation , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[27] Onur Günlü,et al. Reliable secret-key binding for physical unclonable functions with transform coding , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[28] Saeedeh Parsaeefard,et al. Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.
[29] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.
[30] Wei Zhang,et al. Hybrid time-frequency domain chaotic interleaving for physical-layer security enhancement in OFDM-PON systems , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[31] Jian Shen,et al. An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..
[32] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[33] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[34] Vijay K. Bhargava,et al. Physical layer security for massive MIMO systems impaired by phase noise , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[35] Guang Gong,et al. A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[36] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[37] Sixto Ortiz. The Wireless Industry Begins to Embrace Femtocells , 2008, Computer.
[38] Marco Baldi,et al. Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.
[39] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[40] Daniele Trinchero,et al. Channel secondary random process for robust secret key generation , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[41] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[42] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[43] Haji M. Furqan,et al. Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[44] Xianbin Wang,et al. Dynamic Subcarrier Coordinate Interleaving for Eavesdropping Prevention in OFDM Systems , 2014, IEEE Communications Letters.
[45] Guang Gong,et al. XOR Encryption Versus Phase Encryption, an In-Depth Analysis , 2015, IEEE Transactions on Electromagnetic Compatibility.
[46] Dennis Goeckel,et al. Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.
[47] Junqing Zhang,et al. Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[48] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[49] Tobias J. Oechtering,et al. A comparison of OFDM, QAM-FBMC, and OQAM-FBMC waveforms subject to phase noise , 2017, 2017 IEEE International Conference on Communications (ICC).
[50] Hai Lin,et al. Intrinsic Interference Based Physical Layer Encryption for OFDM/OQAM , 2017, IEEE Communications Letters.
[51] Hüseyin Arslan,et al. Cyclic feature suppression for physical layer security , 2017, Phys. Commun..
[52] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[53] Marwan Krunz,et al. Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.
[54] Hüseyin Arslan,et al. Controlled Inter-Carrier Interference for Physical Layer Security in OFDM Systems , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[55] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[56] Nicola Laurenti,et al. Energy-based anchor node selection for IoT physical layer authentication , 2016, 2016 IEEE International Conference on Communications (ICC).
[57] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[58] J. L. Massey,et al. Cryptography ― a selective survey , 1986 .
[59] Yahya M. Al-Moliki,et al. Physical-Layer Security Against Known/Chosen Plaintext Attacks for OFDM-Based VLC System , 2017, IEEE Communications Letters.
[60] Mohamed-Slim Alouini,et al. Secret Key Agreement: Fundamental Limits and Practical Challenges , 2017, IEEE Wireless Communications.
[61] Kenta Umebayashi,et al. A study on secure pilot signal design for OFDM systems , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[62] Ming Li,et al. Jamming Resilient Communication Using MIMO Interference Cancellation , 2016, IEEE Transactions on Information Forensics and Security.
[63] Wei Zhang,et al. Joint PAPR Reduction and Physical Layer Security Enhancement in OFDMA-PON , 2016, IEEE Photonics Technology Letters.
[64] Hong Wen,et al. A Novel Framework for Message Authentication in Vehicular Communication Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[65] Hong Wen,et al. Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[66] Jehad M. Hamamreh,et al. On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..
[67] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[68] Xuemin Shen,et al. Towards PHY-Aided Authentication via Weighted Fractional Fourier Transform , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[69] Jehad M. Hamamreh,et al. Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.
[70] Maurice G. Bellanger,et al. Specification and design of a prototype filter for filter bank based multicarrier transmission , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[71] Xiaofu Wu,et al. A channel coding approach for physical-layer authentication , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[72] Aiqun Hu,et al. Analysis of non-reciprocity factors in extracting secret key from wireless channels for practical indoor scenarios , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[73] Qian Zhang,et al. Privacy-Preserving Location Authentication in Wi-Fi Networks Using Fine-Grained Physical Layer Signatures , 2016, IEEE Transactions on Wireless Communications.
[74] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[75] Ming Tang,et al. Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques , 2014, Journal of Lightwave Technology.
[76] Weisheng Hu,et al. Secure OFDM Transmission Precoded by Chaotic Discrete Hartley Transform , 2018, IEEE Photonics Journal.
[77] Behrouz Farhang-Boroujeny,et al. OFDM Versus Filter Bank Multicarrier , 2011, IEEE Signal Processing Magazine.
[78] Behrouz A. Forouzan. TCP/IP Protocol Suite , 1999 .
[79] Swades De,et al. Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users , 2016, IEEE Transactions on Information Forensics and Security.
[80] Mohsen Guizani,et al. Comparative simulation for physical layer key generation methods , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[81] Yuexing Peng,et al. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.
[82] Kazuo Mori,et al. Channel state based secure wireless communication , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[83] Paulo Batista Lopes,et al. A performance comparison between OFDM and FBMC in PLC applications , 2017, 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM).
[84] Kostas Berberidis,et al. Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.
[85] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[86] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[87] Yichen Wang,et al. Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems , 2018, IEEE Transactions on Information Forensics and Security.
[88] Qiang Li,et al. Frequency diverse array beamforming for physical-layer security with directionally-aligned legitimate user and eavesdropper , 2017, 2017 25th European Signal Processing Conference (EUSIPCO).
[89] Yuh-Ren Tsai,et al. Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.
[90] Kai Zeng,et al. Physical layer challenge-response authentication in wireless networks with relay , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[91] Lei Peng,et al. Threat on Physical Layer Security: Side Channel vs. Wiretap Channel , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.
[92] Wen-Qin Wang,et al. Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach , 2018, IEEE Transactions on Information Forensics and Security.
[93] Ramjee Prasad,et al. OFDM for Wireless Communications Systems , 2004 .
[94] R. Chang. Synthesis of band-limited orthogonal signals for multichannel data transmission , 1966 .
[95] Takahiko Saba,et al. Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[96] Anke Schmeink,et al. Comparison and evaluation between FBMC and OFDM systems , 2015, WSA.
[97] Si Chen,et al. ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.
[98] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[99] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[100] Arun Subramanian,et al. Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[101] Feng Liu,et al. A general time-domain artificial noise design for OFDM AF relay systems , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).
[102] Emil Björnson,et al. Jamming-Resistant Receivers for the Massive MIMO Uplink , 2017, IEEE Transactions on Information Forensics and Security.
[103] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[104] Lei Chen,et al. Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.
[105] Mohsen Guizani,et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..
[106] Jing Yang,et al. A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[107] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[108] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[109] Li Zhao,et al. Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.
[110] Zahid Mahmood,et al. Lightweight Two-Level Session Key Management for End User Authentication in Internet of Things , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[111] Paulraj Ponniah. Database Design and Development: An Essential Guide for IT Professionals , 2003 .
[112] Mischa Schwartz,et al. Mobile Wireless Communications: Access and scheduling techniques in cellular systems , 2004 .
[113] Zhen Yang,et al. Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.
[114] Jianxi Yang,et al. Physical layer authentication algorithm based on SVM , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[115] Tao Jiang,et al. A Survey of Emerging M2M Systems: Context, Task, and Objective , 2016, IEEE Internet of Things Journal.
[116] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[117] Jehad M. Hamamreh,et al. Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[118] Qingqing Wu,et al. Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.
[119] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[120] B. Saltzberg,et al. Performance of an Efficient Parallel Data Transmission System , 1967, IEEE Transactions on Communication Technology.
[121] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[122] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[123] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[124] Nader Mokari,et al. Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary , 2017, 2017 Iran Workshop on Communication and Information Theory (IWCIT).
[125] Zhe Wang,et al. Physical layer security OFDM communication using phased array antenna , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[126] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[127] George K. Karagiannidis,et al. How Much Does I/Q Imbalance Affect Secrecy Capacity? , 2016, IEEE Communications Letters.
[128] Roman Marsalek,et al. Experimental study of wireless transceiver authentication using carrier frequency offset monitoring , 2015, 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA).
[129] Marco Baldi,et al. Security gap assessment for the fast fading wiretap channel , 2013, ICT 2013.