메뉴 건너뛰기




Volumn 2014, Issue 3, 2014, Pages 26-33

New threats and innovative protection methods in wireless transmission systems

Author keywords

Authentication; Confidentiality; Cryptography; Threats; Vulnerabilities; Wireless transmission

Indexed keywords


EID: 84907685279     PISSN: 15094553     EISSN: 18998852     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (27)
  • 2
    • 84907691269 scopus 로고    scopus 로고
    • From IPv4 to IPv6 - Data security in the transition phase
    • Venice/Mestre, Italy
    • T. Bilski, "From IPv4 to IPv6 - Data Security in the Transition Phase", in Proc. 7th Int. Conf. Netw. Serv. ICNS 2011, Venice/Mestre, Italy, 2011, pp. 66-72.
    • (2011) Proc. 7th Int. Conf. Netw. Serv. ICNS 2011 , pp. 66-72
    • Bilski, T.1
  • 4
    • 69949156113 scopus 로고    scopus 로고
    • Physical layer attacks on unlinkability in wireless LANs
    • I. Goldberg and M. Atallah, Eds. LNCS, Berlin Heidelberg: Springer
    • K. Bauer, D. McCoy, B. Greenstein, D. Grunwald, and D. Sicker, "Physical layer attacks on unlinkability in wireless LANs", in Privacy Enhancing Technologies, I. Goldberg and M. Atallah, Eds. LNCS, vol. 5672. Berlin Heidelberg: Springer, 2009, pp. 108-127.
    • (2009) Privacy Enhancing Technologies , vol.5672 , pp. 108-127
    • Bauer, K.1    McCoy, D.2    Greenstein, B.3    Grunwald, D.4    Sicker, D.5
  • 5
    • 84907704085 scopus 로고    scopus 로고
    • Traffic analysis based on IP packet size
    • Silesian University of Technology Press, Gliwice, Poland
    • T. Bilski, "Traffic analysis based on IP packet size", Studia Informatica, vol. 32, no. 3A (98), Silesian University of Technology Press, Gliwice, Poland, pp. 167-176, 2011.
    • (2011) Studia Informatica , vol.32 , Issue.3-98 A , pp. 167-176
    • Bilski, T.1
  • 8
    • 67649458219 scopus 로고    scopus 로고
    • Application classification using packet size distribution and port association
    • L. Ying-Dar et al., "Application classification using packet size distribution and port association", J. Netw. and Comp. Appl., vol. 32, no. 5, pp. 1023-1030, 2009.
    • (2009) J. Netw. and Comp. Appl. , vol.32 , Issue.5 , pp. 1023-1030
    • Ying-Dar, L.1
  • 9
    • 33646706570 scopus 로고    scopus 로고
    • Securing wireless mesh networks
    • B. Salem and J. P. Hubaux, "Securing wireless mesh networks", Wirel. Commun., vol. 13, no. 2, pp. 50-55, 2006.
    • (2006) Wirel. Commun. , vol.13 , Issue.2 , pp. 50-55
    • Salem, B.1    Hubaux, J.P.2
  • 13
    • 84907689848 scopus 로고    scopus 로고
    • Physical-layer security in OFDMA-based broadband wireless networks
    • Kioto, Japan
    • X. Wang, M. Tao, J. Mo, and Y. Xu, "Physical-layer security in OFDMA-based broadband wireless networks", in Proc. IEEE Int. Conf. Commun. ICC 2011, Kioto, Japan, 2011, pp. 1-5.
    • (2011) Proc. IEEE Int. Conf. Commun. ICC 2011 , pp. 1-5
    • Wang, X.1    Tao, M.2    Mo, J.3    Xu, Y.4
  • 14
    • 84857778441 scopus 로고    scopus 로고
    • The energy impact of security mechanisms in modern mobile devices
    • Feb.
    • L. Caviglione and A. Merlo, "The energy impact of security mechanisms in modern mobile devices", Netw. Secur., Feb. 2012 [Online]. Available: http://www.ai-lab.it/merlo/publications/NS-2012.pdf
    • (2012) Netw. Secur.
    • Caviglione, L.1    Merlo, A.2
  • 15
    • 84907702888 scopus 로고    scopus 로고
    • Tradeoffs between energy and security in wireless networks
    • F. C. Colon Osorio, E. Agu, and K. McKay, "Tradeoffs between energy and security in wireless networks", Worcester Polytechnic Institute, 2005 [Online]. Available: http://digitalcommons.wpi.edu/computerscience-pubs/67
    • (2005) Worcester Polytechnic Institute
    • Colon Osorio, F.C.1    Agu, E.2    McKay, K.3
  • 20
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages", IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 21
    • 84873731253 scopus 로고    scopus 로고
    • Transmit antenna selection for security enhancement in MIMO wiretap channels
    • N. Yang, P. Lep Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels", IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.1 , pp. 144-154
    • Yang, N.1    Lep Yeoh, P.2    Elkashlan, M.3    Schober, R.4    Collings, I.B.5
  • 22
    • 84881572098 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way transmission with an untrusted relay
    • Shanghai, China
    • J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay", in Proc. IEEE Wirel. Commun. Netw. Conf. WCNC 2013, Shanghai, China, 2013, pp. 3279-3284.
    • (2013) Proc. IEEE Wirel. Commun. Netw. Conf. WCNC 2013 , pp. 3279-3284
    • Mo, J.1    Tao, M.2    Liu, Y.3    Xia, B.4    Ma, X.5
  • 23
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI", IEEE Trans. Sig. Proces., vol. 59, no. 1, pp. 351-361, 2011.
    • (2011) IEEE Trans. Sig. Proces. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 24
    • 84863754970 scopus 로고    scopus 로고
    • Physical layer security of MIMO frequency selective channels by beamforming and noise generation
    • Barcelona, Spain
    • N. Romero-Zurita, M. Ghogho, and D. McLernon, "Physical layer security of MIMO frequency selective channels by beamforming and noise generation", in Proc. 19th Eur. Sig. Proces. Conf. EUSIPCO 2011, Barcelona, Spain, 2011, pp. 829-833.
    • (2011) Proc. 19th Eur. Sig. Proces. Conf. EUSIPCO 2011 , pp. 829-833
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 25
    • 27744504251 scopus 로고    scopus 로고
    • Collaborative beamforming for distributed wireless ad hoc sensor networks
    • H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, "Collaborative beamforming for distributed wireless ad hoc sensor networks", IEEE Trans. Sig. Proces., vol. 53, no. 11, pp. 4110-4124, 2005.
    • (2005) IEEE Trans. Sig. Proces. , vol.53 , Issue.11 , pp. 4110-4124
    • Ochiai, H.1    Mitran, P.2    Poor, H.V.3    Tarokh, V.4
  • 26
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • H. Wang, M. Luo, X. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI", IEEE Sig. Proces. Lett., vol. 20, no. 1, pp. 39-42, 2013.
    • (2013) IEEE Sig. Proces. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.1    Luo, M.2    Xia, X.3    Yin, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.