메뉴 건너뛰기




Volumn 53, Issue 6, 2015, Pages 16-20

The challenges facing physical layer security

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; NETWORK LAYERS; SIGNAL PROCESSING;

EID: 84933048120     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2015.7120011     Document Type: Article
Times cited : (256)

References (15)
  • 4
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in Time-Variant Channels", IEEE Trans. Wireless Commun., vol. 7, 2008, pp. 2571-79.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 5
    • 69749083720 scopus 로고    scopus 로고
    • Channel-based detection of sybil attacks in wireless networks
    • L. Xiao et al., "Channel-Based Detection of Sybil Attacks in Wireless Networks", IEEE Trans. Info. Forensics Security, vol. 4, 2009, pp. 492-503.
    • (2009) IEEE Trans. Info. Forensics Security , vol.4 , pp. 492-503
    • Xiao, L.1
  • 6
    • 79952383608 scopus 로고    scopus 로고
    • Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
    • Sept.
    • X. He and A. Yener, "Providing Secrecy When the Eavesdropper Channel is Arbitrarily Varying: A Case for Multiple Antennas", Proc. 2010 48th Annual Allerton Conf. Commun., Control, and Computing, Sept. 2010, pp. 1228-35.
    • (2010) Proc. 2010 48th Annual Allerton Conf. Commun., Control, and Computing , pp. 1228-1235
    • He, X.1    Yener, A.2
  • 9
    • 84883075684 scopus 로고    scopus 로고
    • Is link signature dependable for wireless security?
    • April
    • X. He et al., "Is Link Signature Dependable for Wireless Security?" Proc. IEEE INFOCOM, 2013, April 2013, pp. 200-04.
    • (2013) Proc. IEEE INFOCOM, 2013 , pp. 200-204
    • He, X.1
  • 10
    • 77952604175 scopus 로고    scopus 로고
    • Information-theoretically secret key generation for fading wireless channels
    • C. Ye et al., "Information-Theoretically Secret Key Generation for Fading Wireless Channels", IEEE Trans. Info. Forensics Security, vol. 5, 2010, pp. 240-54.
    • (2010) IEEE Trans. Info. Forensics Security , vol.5 , pp. 240-254
    • Ye, C.1
  • 11
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments", Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking, 2009, pp. 321-32.
    • (2009) Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking , pp. 321-332
    • Jana, S.1
  • 12
    • 79956227370 scopus 로고    scopus 로고
    • On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input
    • May
    • S. Bashar, D. Zhi, and Chengshan Xiao, "On the Secrecy Rate of Multi-Antenna Wiretap Channel Under Finite-Alphabet Input", IEEE Commun. Lett., vol. 15, no. 5, May 2011, pp. 527-29.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.5 , pp. 527-529
    • Bashar, S.1    Zhi, D.2    Xiao, C.3
  • 13
    • 84871643875 scopus 로고    scopus 로고
    • On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input
    • Dec.
    • S. Basharand, D. Zhi, and Chengshan Xiao, "On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input", IEEE Trans. Commun., vol. 60, no. 12, Dec. 2012, pp. 3816-25.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.12 , pp. 3816-3825
    • Basharand, S.1    Zhi, D.2    Xiao, C.3
  • 14
    • 77956908999 scopus 로고    scopus 로고
    • Achieving secret communication for fast rayleigh fading channels
    • Sept.
    • Z. Li, R. Yates, and W. Trappe, "Achieving Secret Communication for Fast Rayleigh Fading Channels", IEEE Trans. Wireless Commun., vol. 9, no. 9, Sept. 2010, pp. 2792-99.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.9 , pp. 2792-2799
    • Li, Z.1    Yates, R.2    Trappe, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.