Information Security of PHY Layer in Wireless Networks
暂无分享,去创建一个
Chao Chen | Yanzan Sun | Weidong Fang | Fengrong Li | Shanji Chen | Lianhai Shan | Mei-Ju Lin | Weidong Fang | Shanji Chen | Yanzan Sun | Lianhai Shan | Fengrong Li | Chao Chen | Mei-Ju Lin
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] Ming Zhao,et al. PHY security enhancement in analog network coding based on artificial noise , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[3] Richard Demo Souza,et al. Optimizing the code rate for achieving energy-efficient wireless communications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[4] Michal Pióro,et al. Fair flow rate optimization by effective placement of directional antennas in wireless mesh networks , 2015, Perform. Evaluation.
[5] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[6] Chin-Chen Chang,et al. Recent Advances in Security and Privacy for Wireless Sensor Networks , 2015, J. Sensors.
[7] Neeli Rashmi Prasad,et al. Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[8] Muhammad Jaseemuddin,et al. A Survey On MAC Protocols for Wireless Adhoc Networks with Beamforming Antennas , 2012, IEEE Communications Surveys & Tutorials.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[11] Li Hao,et al. A Highly Efficient Secure Communication Interface: Collision-Free Frequency Hopping (CFFH) , 2007 .
[12] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[13] Ananthram Swami,et al. PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.
[14] Marco Baldi,et al. Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.
[15] Mark F. Flanagan,et al. A Soft Decode–Compress–Forward Relaying Scheme for Cooperative Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[16] Tai-Hoon Kim,et al. Detecting bad information in mobile wireless networks based on the wireless application protocol , 2013, Computing.
[17] M. Darnell,et al. Security considerations in frequency hopping radio systems , 1994 .
[18] Christian Wietfeld,et al. Self-organizing fractional frequency reuse for femtocells using adaptive frequency hopping , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[19] Li Shaoqian,et al. A new anti-jam receiver for MFSK/FFH system with multitone jamming , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[20] Sanghun Im,et al. Secure Antenna Subset Modulation with Coordinate Interleaved Orthogonal Designs , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).
[21] Jean-Yves Chouinard,et al. Enhancing secrecy of the Gaussian wiretap channel using rate compatible LDPC codes with error amplification , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).
[22] Mohammad Abdel-Rahman,et al. Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems , 2014, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[23] Oscar Moreno,et al. Secure CDMA and Frequency Hop Sequences , 2013, ISWCS.
[24] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[25] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[26] Xiao Ma,et al. Performance study of hybrid DS/FFH spread-spectrum systems in the presence of frequency-selective fading and multiple-access interference , 2012, 2012 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[27] Tongtong Li,et al. Toward secure cognitive communications in wireless networks , 2012, IEEE Wireless Communications.
[28] Aamir Saeed Malik,et al. Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..
[29] Xiao Ma,et al. Hybrid DS/FFH spread-spectrum: A robust, secure transmission technique for communication in harsh environments , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[30] Pietro Liò,et al. Detection Probability Estimation of Directional Antennas and Omni-Directional Antennas , 2010, Wirel. Pers. Commun..
[31] Caijun Zhong,et al. Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.
[32] Kai Chen,et al. Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.
[33] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[34] Jianwei Zhou,et al. Practical frequency hopping sequence design for interference avoidance in 802.15.4e TSCH networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[35] Marco Baldi,et al. Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[36] Baoyu Zheng,et al. Defending against eavesdropping attack leveraging multiple antennas in wireless networks , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).
[37] Byung-Jae Kwak,et al. Physical Layer Security with Yarg Code , 2009, 2009 First International Conference on Emerging Network Intelligence.
[38] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[39] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[40] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[41] Xiaohua Li,et al. Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..
[42] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[43] Qing Yang,et al. Asynchronous Convolutional-Coded Physical-Layer Network Coding , 2013, IEEE Transactions on Wireless Communications.
[44] Tracy Camp,et al. Distributed Decode and Forward Beamforming , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[45] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[46] Byung-Jae Kwak,et al. LDPC codes for physical layer security , 2009, GLOBECOM 2009.
[47] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[48] Wenyuan Xu. Jamming Attack Defense , 2011, Encyclopedia of Cryptography and Security.
[49] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[50] Peng Wei-ming. Research on Anti-jamming Synchronization Algorithm in the Frequency Hopping Communication System , 2011 .
[51] Robert W. Heath,et al. Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[52] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[53] Jinho Choi,et al. Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers , 2014, 2014 IEEE International Conference on Communications (ICC).
[54] Robert G. Maunder,et al. 20 Years of Turbo Coding and Energy-Aware Design Guidelines for Energy-Constrained Wireless Applications , 2016, IEEE Communications Surveys & Tutorials.
[55] Zhiliang Yang,et al. Artificial noise and LDPC code aided physical layer security enhancement , 2014 .
[56] Günes Karabulut-Kurt,et al. Efficient PHY layer security in MIMO-OFDM: Spatiotemporal selective artificial noise , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[57] Gonzalo Seco-Granados,et al. Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[58] Aijun Liu,et al. Polar-LDPC Concatenated Coding for the AWGN Wiretap Channel , 2014, IEEE Communications Letters.
[59] Guevara Noubir,et al. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.
[60] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[61] Xin Wang,et al. Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.