SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security
暂无分享,去创建一个
Marco Gomes | Willie K. Harrison | João P. Vilela | André Silva | J. Vilela | M. Gomes | André Silva
[1] Paulo S. R. Diniz,et al. Adaptive Filtering: Algorithms and Practical Implementation , 1997 .
[2] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[3] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[4] Ahmad Y. Javaid,et al. Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers , 2020, IEEE Transactions on Vehicular Technology.
[5] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[7] Alan Tennant,et al. Multichannel Dynamic Directional Modulation with Software Defined Radio , 2020, 2020 14th European Conference on Antennas and Propagation (EuCAP).
[8] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[9] Willie K. Harrison,et al. Generating a Binary Symmetric Channel for Wiretap Codes , 2019, IEEE Transactions on Information Forensics and Security.
[10] Marco Gomes,et al. Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime , 2016, IEEE Signal Processing Letters.
[11] Telmo R. Fernandes,et al. Testbed Implementation and Evaluation of Interleaved and Scrambled Coding for Physical-Layer Security , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[12] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[13] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[14] Georg Fischer,et al. Enabling Fake Base Station Detection through Sample-based Higher Order Noise Statistics , 2019, 2019 42nd International Conference on Telecommunications and Signal Processing (TSP).
[15] Berna Özbek,et al. Key Error Rates in Physical Layer Key Generation: Theoretical Analysis and Measurement-Based Verification , 2017, IEEE Wireless Communications Letters.
[16] Alexandre J. Pierrot,et al. Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Willie K. Harrison,et al. SDR Testbed of Full-Duplex Jamming for Secrecy , 2020, 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).
[19] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[20] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[21] Dong Wang,et al. Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City , 2019, IEEE Access.
[22] Navninderjit Singh,et al. LoRa PHY Range Tests and Software Decoding - Physical Layer Security , 2019, 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN).
[23] Monson H. Hayes,et al. Statistical Digital Signal Processing and Modeling , 1996 .
[24] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[25] Athanasios V. Vasilakos,et al. Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions , 2016, Proceedings of the IEEE.
[26] Roman Marsálek,et al. Wireless device classification through transmitter imperfections — Evaluation of performance degradation due to the chip heating , 2017, 2017 IEEE Radio and Wireless Symposium (RWS).
[27] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[28] Marco Gomes,et al. Interleaved Coding for Secrecy with a Hidden Key , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[29] Dong Wang,et al. A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[30] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[31] Steve Rogers,et al. Adaptive Filter Theory , 1996 .
[32] Willie K. Harrison,et al. Full-Duplex Jamming for Enhanced Hidden-Key Secrecy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[33] Marco Gomes,et al. Adaptive Physical-Layer Security Through Punctured Coding for Secrecy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[34] Ahmad Y. Javaid,et al. Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS) , 2019, 2019 Wireless Telecommunications Symposium (WTS).
[35] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.