Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming

Author(s):  
Rashad Eletreby ◽  
Hanif Rahbari ◽  
Marwan Krunz
Author(s):  
J. Joaquín Escudero-Garzás ◽  
Ana García-Armada

The aim of this chapter is to address the role of a novel concept in wireless telecommunications: Game theory. Game theory is a branch of applied mathematics, which has recently drawn attention as a powerful tool to solve complex problems in wireless environments. To fulfil the intended goal, this chapter introduces the most relevant concepts of game theory such as game, player, and strategy, and give an overview of the applications of game theory in wireless networks.


2019 ◽  
Author(s):  
Kurniawan D. Irianto ◽  
Giang T. Nguyen ◽  
Hani Salah ◽  
Frank H.P. Fitzek

Data transmission in wireless networks is vulnerable to errors, due to the nature of wireless characteristics. As a result, corrupted packets are a common case in wireless data transmissions. Many techniques have been proposed to tackle these issues and one of the recommended techniques is the partial packet recovery (PPR) scheme. There are various existing PPR methods that have been proposed, in the last two decades, in wireless networks. In addition, recent works have shown the possibility of network coding along with its capabilities in recovering the partial packets. This paper presents a review study of PPR approaches in wireless networks. We classify the approaches into several groups based on the soft information in the PHY layer. Furthermore, we describe the PPR techniques that have used in each of these groups. Our studies found that there are twenty-four protocols have been proposed using PPR to improve the performance in wireless networks.


2016 ◽  
Vol 54 (5) ◽  
pp. 98-105 ◽  
Author(s):  
Bruno Clerckx ◽  
Hamdi Joudeh ◽  
Chenxi Hao ◽  
Mingbo Dai ◽  
Borzoo Rassouli

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Weidong Fang ◽  
Fengrong Li ◽  
Yanzan Sun ◽  
Lianhai Shan ◽  
Shanji Chen ◽  
...  

Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.


2020 ◽  
Vol 144 ◽  
pp. 260-267
Author(s):  
Guangshun Li ◽  
Xiaofei Sheng ◽  
Junhua Wu ◽  
Haili Yu

Sign in / Sign up

Export Citation Format

Share Document