A Survey onWireless Security : Technical Challenges , Recent Advances , and Future Trends

| Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

[1]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[2]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[3]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[4]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[5]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[6]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[7]  Dieter Hogrefe,et al.  Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[8]  Peyman Kabiri,et al.  Identification of effective network features to detect Smurf attacks , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[11]  Qiang Li,et al.  A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[13]  Hesham El Gamal,et al.  ARQ-Based Secret Key Sharing , 2009, 2009 IEEE International Conference on Communications.

[14]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[15]  Muhammad Ali Imran,et al.  A Survey of Self Organisation in Future Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[16]  Brian M. Sadler,et al.  MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[18]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[19]  Geir M. Køien Mutual entity authentication for LTE , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[20]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[21]  Amr M. Youssef,et al.  On the sliding property of SNOW 3 G and SNOW 2.0 , 2011, IET Inf. Secur..

[22]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[23]  Javier Blesa,et al.  Artificial noise scheme to ensure secure communications in CWSN , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[24]  Bernhard Walke,et al.  IEEE 802.11 Wireless Local Area Networks , 2006 .

[25]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[26]  Petre Stoica,et al.  Direction finding in the presence of an intermittent interference , 2002, IEEE Trans. Signal Process..

[27]  Marco Conti,et al.  Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows , 2008, IEEE Transactions on Mobile Computing.

[28]  N.E. Hastings,et al.  TCP/IP spoofing fundamentals , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.

[29]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[30]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[31]  Tongtong Li,et al.  CDMA physical layer built-in security enhancement , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[32]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[33]  Eli Biham,et al.  A Fast New DES Implementation in Software , 1997, FSE.

[34]  Ingrid Moerman,et al.  The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX , 2012, IEEE Communications Surveys & Tutorials.

[35]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.

[36]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[37]  Xuemin Shen,et al.  Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.

[38]  Geoffrey Ye Li,et al.  Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[39]  Pierre Duhamel,et al.  Subspace-based blind and semi-blind channel estimation for OFDM systems , 2002, IEEE Trans. Signal Process..

[40]  Jinhui Chen,et al.  Multiuser transmit security beamforming in wireless multiple access channels , 2012, 2012 IEEE International Conference on Communications (ICC).

[41]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[42]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[43]  Aylin Yener,et al.  MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[44]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[45]  Jing Wang,et al.  Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[46]  R. Hunt,et al.  TCP/IP security threats and attack methods , 1999, Comput. Commun..

[47]  Ma Kui,et al.  Research of Bluetooth Security Manager , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.

[48]  Qiang Gu,et al.  A novel classification scheme for 802.11 WLAN active attacking traffic patterns , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[49]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[50]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[51]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[52]  Kyungwhoon Cheun,et al.  Millimeter-wave beamforming as an enabling technology for 5G cellular communications: theoretical feasibility and prototype results , 2014, IEEE Communications Magazine.

[53]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[54]  Donald F. Towsley,et al.  Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.

[55]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[56]  Martin Hope,et al.  Active router approach to defeating denial-of-service attacks in networks , 2007, IET Commun..

[57]  B. Sklar,et al.  Rayleigh fading channels in mobile digital communication systems Part I: Characterization , 1997, IEEE Commun. Mag..

[58]  Xin Liu,et al.  SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[59]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[60]  Don J. Torrieri Frequency Hopping with Multiple Frequency-Shift Keying and Hard Decisions , 1984, IEEE Trans. Commun..

[61]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[62]  Chava Vijaya Saradhi,et al.  Physical layer impairment aware routing (PLIAR) in WDM optical networks: issues and challenges , 2009, IEEE Communications Surveys & Tutorials.

[63]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[64]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[65]  Fan Yang Comparative Analysis on TEK Exchange between PKMv1 and PKMV2 for WiMAX , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[66]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[67]  Shuangqing Wei,et al.  ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels , 2013, IEEE Transactions on Information Forensics and Security.

[68]  Ming Li,et al.  ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.

[69]  Stefan Parkvall,et al.  LTE: the evolution of mobile broadband , 2009, IEEE Communications Magazine.

[70]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[71]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[72]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[73]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[74]  Lee Freitag,et al.  Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication , 2001 .

[75]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[76]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[77]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[78]  John Ioannidis,et al.  A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.

[79]  Cristina V. Lopes,et al.  A survey, classification and comparative analysis of medium access control protocols for ad hoc networks , 2004, IEEE Communications Surveys & Tutorials.

[80]  Vijay K. Bhargava,et al.  Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity , 2009, IEEE Transactions on Wireless Communications.

[81]  Sneha Kumar Kasera,et al.  Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[82]  Michael D. Ernst,et al.  Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[83]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2006, TNET.

[84]  M. Yacoub,et al.  On higher order statistics of the Nakagami-m distribution , 1999 .

[85]  Kjell Jørgen Hole,et al.  Securing Wi-Fi Networks , 2005, Computer.

[86]  Chih-Peng Fan,et al.  Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP , 2007, 2007 International Symposium on Intelligent Signal Processing and Communication Systems.

[87]  Desmond Loh Chin Choong,et al.  Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.

[88]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[89]  Wenyuan Xu,et al.  An Error-Minimizing Framework for Localizing Jammers in Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[90]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[91]  Chen-Wei Yang,et al.  Secure enhanced wireless transfer protocol , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[92]  Dirk Wübben,et al.  Cloud technologies for flexible 5G radio access networks , 2014, IEEE Communications Magazine.

[93]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[94]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[95]  Herbert J. Mattord,et al.  Principles of Information Security, 4th Edition , 2011 .

[96]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[97]  Zhouyue Pi,et al.  LTE-advanced modem design: challenges and perspectives , 2012, IEEE Communications Magazine.

[98]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[99]  Jaesung Lim,et al.  Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[100]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[101]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[102]  Taeshik Shon,et al.  An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions , 2007, NBiS.

[103]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[104]  Raghupathy Sivakumar,et al.  Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[105]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[106]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[107]  Fotis Foukalas,et al.  Cross-layer design proposals for wireless mobile networks: a survey and taxonomy , 2008, IEEE Communications Surveys & Tutorials.

[108]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[109]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[110]  C. B. Sankaran,et al.  Network access security in next- generation 3GPP systems: A tutorial , 2009, IEEE Communications Magazine.

[111]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[112]  Günes Karabulut-Kurt,et al.  Analysis on the effects of artificial noise on physical layer security , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).

[113]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[114]  Abhijit Bose,et al.  Delayed Internet routing convergence , 2000, SIGCOMM.

[115]  Dijiang Huang,et al.  Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[116]  K. Hatonen,et al.  Advanced analysis methods for 3G cellular networks , 2005, IEEE Transactions on Wireless Communications.

[117]  Peng Ning,et al.  Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.

[118]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[119]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[120]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[121]  Chonggang Wang,et al.  Future internet services and applications , 2010, IEEE Netw..

[122]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[123]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[124]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[125]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[126]  Andrew T. Campbell,et al.  Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA , 2001, IEEE Commun. Mag..

[127]  Prasant Mohapatra,et al.  Adaptive wireless channel probing for shared key generation , 2011, 2011 Proceedings IEEE INFOCOM.

[128]  Lizhong Zheng,et al.  Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.

[129]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[130]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[131]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[132]  Timothy A. Thomas,et al.  LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.

[133]  Xiaodong Lin,et al.  CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[134]  Erina Ferro,et al.  Bluetooth and Wi-Fi wireless protocols: a survey and a comparison , 2005, IEEE Wireless Communications.

[135]  Hong Huang,et al.  On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.

[136]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[137]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[138]  T. Bass,et al.  E-mail bombs and countermeasures: cyber attacks on availability and brand integrity , 1998, IEEE Netw..

[139]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[140]  Steven D. Gray,et al.  Transmit diversity in 3G CDMA systems , 2002 .

[141]  Theofilos Chrysikos,et al.  A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security , 2009, SEWCN.

[142]  Sung-Ju Lee,et al.  STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.

[143]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[144]  Mineo Takai,et al.  Effects of wireless physical layer modeling in mobile ad hoc networks , 2001, MobiHoc '01.

[145]  Martin Haenggi,et al.  Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[146]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[147]  Xiqi Gao,et al.  Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.

[148]  Diptikalyan Saha,et al.  Securing electronic commerce: reducing the SSL overhead , 2000 .

[149]  Xianbin Wang,et al.  Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[150]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[151]  Ali Abdi,et al.  On the estimation of the K parameter for the Rice fading distribution , 2001, IEEE Communications Letters.

[152]  Charalampos Konstantopoulos,et al.  Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[153]  Mark Allman,et al.  FTP Security Considerations , 1999, RFC.

[154]  Xianbin Wang,et al.  Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[155]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.

[156]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[157]  Pin-Han Ho,et al.  Authentication Authorization and Accounting (AAA) Schemes in WiMAX , 2006, 2006 IEEE International Conference on Electro/Information Technology.

[158]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[159]  Kai Zeng,et al.  Physical layer challenge-response authentication in wireless networks with relay , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[160]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[161]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[162]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[163]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[164]  Emmanuel Lance,et al.  A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system , 1997, IEEE Trans. Commun..

[165]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[166]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[167]  Rehan Akbani,et al.  Authentication in Wireless Networks , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[168]  Masakatu Morii,et al.  A Practical Message Falsification Attack on WPA , 2009 .

[169]  Qinghua Li,et al.  Advancement of MIMO technology in WiMAX: from IEEE 802.16d/e/j to 802.16m , 2009, IEEE Commun. Mag..

[170]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[171]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[172]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.

[173]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[174]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[175]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[176]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[177]  Yu-Dong Yao,et al.  Opportunistic Distributed Space-Time Coding for Decode-and-Forward Cooperation Systems , 2012, IEEE Transactions on Signal Processing.

[178]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[179]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[180]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.