Adaptive Physical Layer Security Framework for Wireless Systems

Author(s):  
Ozge Cepheli ◽  
Volker Lucken ◽  
Guido Dartmann ◽  
Gunes Karabulut Kurt ◽  
Gerd Ascheid
2016 ◽  
Vol 114 (1) ◽  
pp. 19-26 ◽  
Author(s):  
H. Vincent Poor ◽  
Rafael F. Schaefer

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.


2021 ◽  
Vol 3 (2) ◽  
pp. 59-67
Author(s):  
Abul Bashar ◽  
Smys S

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.


2020 ◽  
Vol 27 (4) ◽  
pp. 32-39
Author(s):  
Ozan Alp Topal ◽  
Mehmet Ozgun Demir ◽  
Zekai Liang ◽  
Ali Emre Pusane ◽  
Guido Dartmann ◽  
...  

2014 ◽  
Vol 13 (6) ◽  
pp. 3442-3451 ◽  
Author(s):  
Walid Saad ◽  
Xiangyun Zhou ◽  
Zhu Han ◽  
H. Vincent Poor

2016 ◽  
Vol 15 (11) ◽  
pp. 7547-7560 ◽  
Author(s):  
Qian Yang ◽  
Hui-Ming Wang ◽  
Yi Zhang ◽  
Zhu Han

2021 ◽  
Author(s):  
Olfa Ben Yahia ◽  
Eylem Erdogan ◽  
Gunes Karabulut Kurt ◽  
Ibrahim Altunbas ◽  
Halim Yanikomeroglu

Author(s):  
Matthieu Bloch ◽  
Joao Barros

Author(s):  
Shijie WANG ◽  
Yuanyuan GAO ◽  
Xiaochen LIU ◽  
Guangna ZHANG ◽  
Nan SHA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document