Physical layer security
172 Followers
Recent papers in Physical layer security
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
We study the problem of physical layer security in massive multiple-input multiple-output (MaMIMO) cognitive radio networks (CRNs). In particular, we investigate the design of a smart jamming attack on the uplink transmission of a CRN in... more
Long range wide area network (LoRaWAN) is one of the most widely used low power wide area (LPWA) network technologies in the unlicensed ISM bands. LoRaWAN adopts chirp spread spectrum (CSS) based physical layer specification which is... more
Secrecy capacity is a fundamental informationtheoretic performance metric to predict the maximum data rate of reliable communication, while the intended message is not revealed to the eavesdropper. Motivated by this consideration, in this... more
In this letter, the system performance of the DF full-duplex (FD) relaying communication network is investigated with physical layer security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping... more
In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed in the literature, reactive jamming, i.e., targeting only... more
In this paper, a novel secure data transmission method called interference signal superposition-aided multiple-input multiple-output with antenna number modulation and adaptive antenna selection (ISS-MIMO-ANM-AAS) is presented to defend... more
Encryption is the process of encoding messages in such a way, that they can only be decoded by the intended receiver. On the other hand, physical-layer (PHY) security exploits channel characteristics, such as noise and multipath fading,... more
LTE is an emerging wireless communication technology to provide high-speed data service for the mobile phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP since Release 8. There is no common... more
In this paper, we investigate the reliability and security performance of cooperative multi-relay systems, where both source and relay nodes are energy-constrained nonlinear energy harvesters, scavenging energy from a power beacon nearby.... more
Even though the wireless network of 5G has not been investigated exhaustively, the sixth generation (6G) echo systems' visionaries are already being debated. Therefore, to solidify and consolidate privacy and security within 6G networks,... more
This research work has investigated the physical layer security of both MISO and OFDM-MIMO communication systems. This project explored the use of beamforming and artificial noise generation as transmit strategy to achieve secure... more
With the current technology revolution, underwater wireless sensor networks (UWSNs) find several applications such as disaster prevention, water quality monitoring, military surveillance and fish farming. Nevertheless, this kind of... more
In this paper proposes security issues and its solution for WiMAX network. Jamming and Scrambling is main security issues regarding Physical Layer. The lack of Physical infrastructure of wireless networks is... more
This paper presents a secure beamforming design to prevent eavesdropping on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The devices communicate via a trusted relay which performs physical layer network... more
The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for... more
The future wireless communication systems demand enhanced security and reliability than the current systems. In this work, we propose a more simple yet efficient physical layer security (PLS) technique for achieving reliable and secure... more
—In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons... more
—We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple non-colluding eavesdroppers attempt to intercept the... more
As the latest member of the multiple access family, non-orthogonal multiple access (NOMA) has been recently proposed for 3GPP Long Term Evolution (LTE) and envisioned to be an essential component of 5th generation (5G) mobile networks.... more
Considering the advancements of the internet of things (IoT) in 6G and beyond communications , data transmission security in IoT devices has received extensive interest because of their significant features, such as low computational... more
We consider the multiple-input multiple-output (MIMO) wiretap channel under a minimum receiver-side power constraint in addition to the usual maximum transmitter-side power constraint. This problem is motivated by energy harvesting... more
We propose a new secure underwater acoustic communication scheme designed to let a user (Alice) transmit a confidential message to another user (Bob) in the presence of an eavesdropper (Eve). A typical approach in conventional wireless... more
Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of wireless communications: an attacker can easily target... more
This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate.... more
In this work, to overcome the flaws of standard chaotic maps we generated two new cascaded structures, 3D Cubic-Sine and 2D Cubic-Cat chaotic parametric maps, based on a new parameter-varied Cubic map that enhance the chaos complexity and... more
In this work, to overcome the flaws of standard chaotic maps we generated two new cascaded structures, 3D Cubic-Sine and 2D Cubic-Cat chaotic parametric maps, based on a new parameter-varied Cubic map that enhance the chaos complexity and... more
We focus on a scenario where two wireless source nodes wish to exchange confidential information via an RF energy harvesting untrusted two-way relay. Despite its cooperation in forwarding the information, the relay is considered untrusted... more
—The broadcast nature of the wireless medium allows unintended users to eavesdrop the confidential information transmission. In this regard, we investigate the problem of secure communication between a source and a destination via a... more
Wireless communications are increasingly important in health-care applications, particularly in those that use implantable medical devices (IMDs). Such systems have many advantages in providing remote healthcare in terms of monitoring,... more
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and compromise necessitate the use of an on-line key generation,... more
Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common... more
We analyze the secrecy outage performance of a mixed radio frequency-free space optical (RF-FSO) transmission system with imperfect channel state information (CSI). We deal with a single-input multiple-output (SIMO) wiretap model, where a... more
Recent advances in spectrum access technologies, such as cognitive radios, have made spectrum sharing a viable option for addressing the spectrum shortage problem. However , these advances have also contributed to the increased... more