Physical Layer Security in Wireless Communication Networks

Author(s):  
Özge Cepheli ◽  
Güneş Karabulut Kurt

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networks still remains a challenge. Secure transmission techniques in these networks are discussed throughout this chapter. PHY security measures, the secrecy rate, the secrecy capacity, and the outage secrecy rate are introduced. Security needs of wireless networks are discussed and the related common attack types are described. Main countermeasures that are proposed to prevent these attacks are also presented with both practical and theoretical perspectives.

Author(s):  
Е.Е. Девяткин ◽  
Д.Н. Федоров ◽  
Я.М. Гасс ◽  
М.В. Иванкович

Рассмотрены и классифицированы существующие узкополосные беспроводные сети связи (УБСС), реализованные с использованием конвергентных решений. Показано, что появление нового объекта регулирования УБСС интернета вещей усиливает необходимость перехода от локальных корректировок законодательства в сфере связи к созданию инфо- коммуникационного кодекса Российской Федерации. Existing narrowband wireless communication networks using convergent solutions are reviewed and classified. It is shown that the emergence of narrowband wireless networks of Internet of things increases the need for transition from local adjustments of legislation in the field of communications to the creation of the Infocommunication Code of the Russian Federation.


Author(s):  
Sheikh I. Ahamed ◽  
Mohammad Zulkernine ◽  
Munirul M. Haque

Pervasive computing has progressed significantly during this decade due to the developments and advances in portable, low-cost, and light-weight devices along with the emergence of short range and low-power wireless communication networks. Pervasive computing focuses on combining computing and communications with the surrounding physical environment to make computing and communication transparent to the users in day-to-day activities. In pervasive computing, numerous, casually accessible, often invisible, frequently mobile or embedded devices form an ad-hoc network that occasionally connects to fixed networks structure too. These pervasive computing devices often collect information about the surrounding environment using various sensors. Pervasive computing has the inherent disadvantages of slow, expensive connections, frequent line disconnections, limited host bandwidth, location dependent data, and so forth. These challenges make pervasive computing applications more vulnerable to various security-related threats. However, traditional security measures do not fit well in pervasive computing applications. Since location and context are key attributes of pervasive computing applications, privacy issues need to be handled in a sophisticated manner. The devices in a pervasive computing network leave and join in an ad-hoc manner. This device behavior creates a need for new trust models for pervasive computing applications. In this chapter, we address the challenges and requirements of security, privacy, and trust for pervasive applications. We also discuss the state-of-the-art of pervasive security, privacy, and trust along with some open issues.


2014 ◽  
Vol 2014 ◽  
pp. 1-13
Author(s):  
Yongli An ◽  
Dong Wang ◽  
Yang Xiao

Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.


2021 ◽  
Vol 69 (4) ◽  
pp. 941-962
Author(s):  
Zoran Miličević ◽  
Zoran Bojković

Introduction/purpose: This paper provides an overview of Unmanned Aerial Vehicles (UAVs) from their early days to their integration into modern wireless networks. Methods: It analyzes, synthesizes and compares the UAVs development technologies throughout their history with significant aspects of their integration in wireless communication networks. Results: Important aspects of wireless communications as one of the key technologies for UAVs are presented. Next, energy efficiency as a research path for UAVs is considered. The paper also emphasizes the present state in this area as well as what the future of UAVs in communications will be. Conclusion: UAVs are important not only for widespread military usage in various combat operations and warfare environment, but also for other purposes such as their integration in 5G networks.


Author(s):  
Danda B. Rawat ◽  
Bhed Bahadur Bista ◽  
Gongjun Yan

Wireless communication networks offer transmission of signals, such as voice, data, and multimedia, without using wires, which is the crucial part of mobile communications. After successful deployment of wireless cellular networks in licensed bands and Wi-Fi networks in unlicensed bands, such as Industry, Scientific, and Medical (ISM) and Unlicensed National Information Infrastructure (UNII), over the last decade, several wireless networks, application, and services are emerging. Furthermore, wireless networks offer several advantages including mobility while getting service, scalability for further extension, reduced cost-of-ownership, and so on. However, there are some disadvantages and concerns, such as security, data rate, reliability, range, etc. The demand of ubiquitous communications is driving the development of wireless and mobile networks. Wireless communication is the fastest growing segment of the communication industry. This chapter provides the fundamentals of wireless and mobile networks and their advantages and disadvantages.


Author(s):  
Danda B. Rawat ◽  
Bhed Bahadur Bista ◽  
Gongjun Yan

Wireless communication networks offer transmission of signals, such as voice, data, and multimedia, without using wires, which is the crucial part of mobile communications. After successful deployment of wireless cellular networks in licensed bands and Wi-Fi networks in unlicensed bands, such as Industry, Scientific, and Medical (ISM) and Unlicensed National Information Infrastructure (UNII), over the last decade, several wireless networks, application, and services are emerging. Furthermore, wireless networks offer several advantages including mobility while getting service, scalability for further extension, reduced cost-of-ownership, and so on. However, there are some disadvantages and concerns, such as security, data rate, reliability, range, etc. The demand of ubiquitous communications is driving the development of wireless and mobile networks. Wireless communication is the fastest growing segment of the communication industry. This chapter provides the fundamentals of wireless and mobile networks and their advantages and disadvantages.


Sign in / Sign up

Export Citation Format

Share Document