Search
Now showing items 11-20 of 20
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Energy-aware cross-layer optimization for EEG-based wireless monitoring applications
(
IEEE Computer Society
, 2013 , Conference Paper)
Body Area Sensor Networks (BASNs) for healthcare applications have gained significant research interests recently due to the growing number of patients with chronic diseases requiring constant monitoring. Because of the ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
(
ACM
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming
(
Hindawi Limited
, 2018 , Article)
We propose in this paper a physical-layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate ...
Performance analysis of relay selection schemes in OFDM-based underlay cognitive networks
(
IEEE
, 2013 , Conference Paper)
Cognitive radio (CR) is a promising technology that allows wireless systems to sense the environment and learn from previous experience to improve the communication quality. However, CR needs a flexible and adaptive physical ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Joint physical-application layer security for wireless multimedia delivery
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ...