A Survey onWireless Security : Technical Challenges , Recent Advances , and Future Trends
暂无分享,去创建一个
Lajos Hanzo | Yulong Zou | Xianbin Wang | Jia Zhu | L. Hanzo | Xianbin Wang | Yulong Zou | Jia Zhu
[1] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[2] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[3] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[4] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[5] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[6] R. Negi,et al. Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[7] Dieter Hogrefe,et al. Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[8] Peyman Kabiri,et al. Identification of effective network features to detect Smurf attacks , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[11] Qiang Li,et al. A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[13] Hesham El Gamal,et al. ARQ-Based Secret Key Sharing , 2009, 2009 IEEE International Conference on Communications.
[14] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[15] Muhammad Ali Imran,et al. A Survey of Self Organisation in Future Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[16] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.
[17] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[18] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[19] Geir M. Køien. Mutual entity authentication for LTE , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[20] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[21] Amr M. Youssef,et al. On the sliding property of SNOW 3 G and SNOW 2.0 , 2011, IET Inf. Secur..
[22] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[23] Javier Blesa,et al. Artificial noise scheme to ensure secure communications in CWSN , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[24] Bernhard Walke,et al. IEEE 802.11 Wireless Local Area Networks , 2006 .
[25] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[26] Petre Stoica,et al. Direction finding in the presence of an intermittent interference , 2002, IEEE Trans. Signal Process..
[27] Marco Conti,et al. Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows , 2008, IEEE Transactions on Mobile Computing.
[28] N.E. Hastings,et al. TCP/IP spoofing fundamentals , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.
[29] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[30] Ami Wiesel,et al. On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[31] Tongtong Li,et al. CDMA physical layer built-in security enhancement , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[32] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[33] Eli Biham,et al. A Fast New DES Implementation in Software , 1997, FSE.
[34] Ingrid Moerman,et al. The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX , 2012, IEEE Communications Surveys & Tutorials.
[35] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.
[36] Srikanth V. Krishnamurthy,et al. On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.
[37] Xuemin Shen,et al. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.
[38] Geoffrey Ye Li,et al. Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[39] Pierre Duhamel,et al. Subspace-based blind and semi-blind channel estimation for OFDM systems , 2002, IEEE Trans. Signal Process..
[40] Jinhui Chen,et al. Multiuser transmit security beamforming in wireless multiple access channels , 2012, 2012 IEEE International Conference on Communications (ICC).
[41] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[42] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[43] Aylin Yener,et al. MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[44] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[45] Jing Wang,et al. Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[46] R. Hunt,et al. TCP/IP security threats and attack methods , 1999, Comput. Commun..
[47] Ma Kui,et al. Research of Bluetooth Security Manager , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.
[48] Qiang Gu,et al. A novel classification scheme for 802.11 WLAN active attacking traffic patterns , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[49] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[50] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[51] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[52] Kyungwhoon Cheun,et al. Millimeter-wave beamforming as an enabling technology for 5G cellular communications: theoretical feasibility and prototype results , 2014, IEEE Communications Magazine.
[53] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[54] Donald F. Towsley,et al. Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.
[55] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[56] Martin Hope,et al. Active router approach to defeating denial-of-service attacks in networks , 2007, IET Commun..
[57] B. Sklar,et al. Rayleigh fading channels in mobile digital communication systems Part I: Characterization , 1997, IEEE Commun. Mag..
[58] Xin Liu,et al. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[59] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[60] Don J. Torrieri. Frequency Hopping with Multiple Frequency-Shift Keying and Hard Decisions , 1984, IEEE Trans. Commun..
[61] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[62] Chava Vijaya Saradhi,et al. Physical layer impairment aware routing (PLIAR) in WDM optical networks: issues and challenges , 2009, IEEE Communications Surveys & Tutorials.
[63] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[64] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[65] Fan Yang. Comparative Analysis on TEK Exchange between PKMv1 and PKMV2 for WiMAX , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.
[66] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[67] Shuangqing Wei,et al. ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels , 2013, IEEE Transactions on Information Forensics and Security.
[68] Ming Li,et al. ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.
[69] Stefan Parkvall,et al. LTE: the evolution of mobile broadband , 2009, IEEE Communications Magazine.
[70] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[71] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[72] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[73] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[74] Lee Freitag,et al. Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication , 2001 .
[75] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[76] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[77] Moustafa Youssef,et al. Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.
[78] John Ioannidis,et al. A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.
[79] Cristina V. Lopes,et al. A survey, classification and comparative analysis of medium access control protocols for ad hoc networks , 2004, IEEE Communications Surveys & Tutorials.
[80] Vijay K. Bhargava,et al. Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity , 2009, IEEE Transactions on Wireless Communications.
[81] Sneha Kumar Kasera,et al. Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[82] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[83] Aleksandar Kuzmanovic,et al. Low-rate TCP-targeted denial of service attacks and counter strategies , 2006, TNET.
[84] M. Yacoub,et al. On higher order statistics of the Nakagami-m distribution , 1999 .
[85] Kjell Jørgen Hole,et al. Securing Wi-Fi Networks , 2005, Computer.
[86] Chih-Peng Fan,et al. Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP , 2007, 2007 International Symposium on Intelligent Signal Processing and Communication Systems.
[87] Desmond Loh Chin Choong,et al. Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.
[88] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[89] Wenyuan Xu,et al. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[90] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[91] Chen-Wei Yang,et al. Secure enhanced wireless transfer protocol , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[92] Dirk Wübben,et al. Cloud technologies for flexible 5G radio access networks , 2014, IEEE Communications Magazine.
[93] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[94] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[95] Herbert J. Mattord,et al. Principles of Information Security, 4th Edition , 2011 .
[96] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[97] Zhouyue Pi,et al. LTE-advanced modem design: challenges and perspectives , 2012, IEEE Communications Magazine.
[98] Mark Stamp,et al. Information security - principles and practice , 2005 .
[99] Jaesung Lim,et al. Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[100] Peng Ning,et al. BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.
[101] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[102] Taeshik Shon,et al. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions , 2007, NBiS.
[103] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[104] Raghupathy Sivakumar,et al. Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[105] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[106] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[107] Fotis Foukalas,et al. Cross-layer design proposals for wireless mobile networks: a survey and taxonomy , 2008, IEEE Communications Surveys & Tutorials.
[108] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[109] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[110] C. B. Sankaran,et al. Network access security in next- generation 3GPP systems: A tutorial , 2009, IEEE Communications Magazine.
[111] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[112] Günes Karabulut-Kurt,et al. Analysis on the effects of artificial noise on physical layer security , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).
[113] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[114] Abhijit Bose,et al. Delayed Internet routing convergence , 2000, SIGCOMM.
[115] Dijiang Huang,et al. Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[116] K. Hatonen,et al. Advanced analysis methods for 3G cellular networks , 2005, IEEE Transactions on Wireless Communications.
[117] Peng Ning,et al. Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.
[118] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[119] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[120] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[121] Chonggang Wang,et al. Future internet services and applications , 2010, IEEE Netw..
[122] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[123] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[124] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[125] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[126] Andrew T. Campbell,et al. Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA , 2001, IEEE Commun. Mag..
[127] Prasant Mohapatra,et al. Adaptive wireless channel probing for shared key generation , 2011, 2011 Proceedings IEEE INFOCOM.
[128] Lizhong Zheng,et al. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.
[129] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[130] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[131] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[132] Timothy A. Thomas,et al. LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.
[133] Xiaodong Lin,et al. CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[134] Erina Ferro,et al. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison , 2005, IEEE Wireless Communications.
[135] Hong Huang,et al. On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.
[136] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[137] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[138] T. Bass,et al. E-mail bombs and countermeasures: cyber attacks on availability and brand integrity , 1998, IEEE Netw..
[139] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[140] Steven D. Gray,et al. Transmit diversity in 3G CDMA systems , 2002 .
[141] Theofilos Chrysikos,et al. A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security , 2009, SEWCN.
[142] Sung-Ju Lee,et al. STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.
[143] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[144] Mineo Takai,et al. Effects of wireless physical layer modeling in mobile ad hoc networks , 2001, MobiHoc '01.
[145] Martin Haenggi,et al. Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[146] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[147] Xiqi Gao,et al. Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.
[148] Diptikalyan Saha,et al. Securing electronic commerce: reducing the SSL overhead , 2000 .
[149] Xianbin Wang,et al. Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).
[150] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[151] Ali Abdi,et al. On the estimation of the K parameter for the Rice fading distribution , 2001, IEEE Communications Letters.
[152] Charalampos Konstantopoulos,et al. Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[153] Mark Allman,et al. FTP Security Considerations , 1999, RFC.
[154] Xianbin Wang,et al. Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[155] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.
[156] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[157] Pin-Han Ho,et al. Authentication Authorization and Accounting (AAA) Schemes in WiMAX , 2006, 2006 IEEE International Conference on Electro/Information Technology.
[158] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[159] Kai Zeng,et al. Physical layer challenge-response authentication in wireless networks with relay , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[160] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[161] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[162] Gene Tsudik,et al. Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.
[163] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[164] Emmanuel Lance,et al. A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system , 1997, IEEE Trans. Commun..
[165] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[166] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[167] Rehan Akbani,et al. Authentication in Wireless Networks , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[168] Masakatu Morii,et al. A Practical Message Falsification Attack on WPA , 2009 .
[169] Qinghua Li,et al. Advancement of MIMO technology in WiMAX: from IEEE 802.16d/e/j to 802.16m , 2009, IEEE Commun. Mag..
[170] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[171] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[172] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.
[173] Sushma,et al. Security Threats in Wireless Sensor Networks , 2011 .
[174] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[175] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[176] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[177] Yu-Dong Yao,et al. Opportunistic Distributed Space-Time Coding for Decode-and-Forward Cooperation Systems , 2012, IEEE Transactions on Signal Processing.
[178] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[179] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[180] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.