메뉴 건너뛰기




Volumn 104, Issue 9, 2016, Pages 1727-1765

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Author keywords

Artificial noise; beamforming; denial of service (DoS); diversity; eavesdropping attack; information theoretic security; jamming; network protocol; wireless jamming; wireless networks; wireless security

Indexed keywords

AUTHENTICATION; BEAMFORMING; CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; INFORMATION THEORY; INTERNET PROTOCOLS; JAMMING; LONG TERM EVOLUTION (LTE); MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; NETWORK LAYERS; NETWORK PROTOCOLS; RADIO WAVES; SECURITY SYSTEMS; SURVEYS; WI-FI; WIRELESS NETWORKS;

EID: 84979824607     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/JPROC.2016.2558521     Document Type: Review
Times cited : (1176)

References (202)
  • 1
    • 84873709871 scopus 로고    scopus 로고
    • A survey of self organisation in future cellular networks
    • Feb.
    • O. Aliu, A. Imran, M. Imran, B. Evans, "A survey of self organisation in future cellular networks," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 336-361, Feb. 2013.
    • (2013) IEEE Commun. Surv. Tut. , vol.15 , Issue.1 , pp. 336-361
    • Aliu, O.1    Imran, A.2    Imran, M.3    Evans, B.4
  • 2
    • 84881315986 scopus 로고    scopus 로고
    • Stochastic geometry for modeling, analysis, design of multi-tier and cognitive cellular wireless networks: A survey
    • 3rd Quart.
    • H. ElSawy, E. Hossain, M. Haenggi, "Stochastic geometry for modeling, analysis, design of multi-tier and cognitive cellular wireless networks: A survey," IEEE Commun. Surv. Tut., vol. 15, no. 3, pp. 996-1019, 3rd Quart. 2013.
    • (2013) IEEE Commun. Surv. Tut. , vol.15 , Issue.3 , pp. 996-1019
    • ElSawy, H.1    Hossain, E.2    Haenggi, M.3
  • 3
    • 84879362525 scopus 로고    scopus 로고
    • ITU Jan. [Online]. Available
    • ITU, "The World in 2013: ICT facts and figures," Jan. 2013. [Online]. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf
    • (2013) The World in 2013: ICT Facts and Figures
  • 4
    • 84983771744 scopus 로고    scopus 로고
    • Symantec The 2012 Norton cybercrime report, Sep. [Online]. Available
    • Symantec Norton Department, "The 2012 Norton cybercrime report," Sep. 2012. [Online]. Available: http://www. norton.com/2012cybercrimereport
    • (2012) Norton Department
  • 5
    • 70350320415 scopus 로고    scopus 로고
    • Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity
    • Sep.
    • M. M. Rashid, E. Hossain, V. K. Bhargava, "Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity," IEEE Trans. Wireless Commun., vol. 8, no. 9, pp. 4568-4579, Sep. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.9 , pp. 4568-4579
    • Rashid, M.M.1    Hossain, E.2    Bhargava, V.K.3
  • 6
    • 65249182443 scopus 로고    scopus 로고
    • Cross-layer design proposals for wireless mobile networks: A survey and taxonomy
    • Apr.
    • F. Foukalas, V. Gazis, N. Alonistioti, "Cross-layer design proposals for wireless mobile networks: A survey and taxonomy," IEEE Commun. Surv. Tut., vol. 10, no. 1, pp. 70-85, Apr. 2008.
    • (2008) IEEE Commun. Surv. Tut. , vol.10 , Issue.1 , pp. 70-85
    • Foukalas, F.1    Gazis, V.2    Alonistioti, N.3
  • 7
    • 23944514713 scopus 로고    scopus 로고
    • A survey, classification and comparative analysis of medium access control protocols for ad hoc networks
    • Apr.
    • R. Jurdak, C. Lopes, P. Baldi, "A survey, classification and comparative analysis of medium access control protocols for ad hoc networks," IEEE Commun. Surv. Tut., vol. 6, no. 1, pp. 2-16, Apr. 2004.
    • (2004) IEEE Commun. Surv. Tut. , vol.6 , Issue.1 , pp. 2-16
    • Jurdak, R.1    Lopes, C.2    Baldi, P.3
  • 8
    • 0035789266 scopus 로고    scopus 로고
    • Effects of wireless physical layer modeling in mobile ad hoc networks
    • Long Beach, CA, USA, Sep.
    • M. Takai, J. Martin, R. Bagrodia, "Effects of wireless physical layer modeling in mobile ad hoc networks," in Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Long Beach, CA, USA, Sep. 2001, pp. 87-94.
    • (2001) Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. , pp. 87-94
    • Takai, M.1    Martin, J.2    Bagrodia, R.3
  • 9
    • 72949115723 scopus 로고    scopus 로고
    • Physical layer impairment aware routing (PLIAR) in WDM optical networks: Issues and challenges
    • Dec.
    • C. Saradhi and S. Subramaniam, "Physical layer impairment aware routing (PLIAR) in WDM optical networks: Issues and challenges," IEEE Commun. Surv. Tut., vol. 11, no. 4, pp. 109-130, Dec. 2009.
    • (2009) IEEE Commun. Surv. Tut. , vol.11 , Issue.4 , pp. 109-130
    • Saradhi, C.1    Subramaniam, S.2
  • 10
    • 84873738656 scopus 로고    scopus 로고
    • Attacks and countermeasures on 802.16: Analysis and assessment
    • Feb.
    • C. Kolias, G. Kambourakis, S. Gritzalis, "Attacks and countermeasures on 802.16: Analysis and assessment," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 487-514, Feb. 2013.
    • (2013) IEEE Commun. Surv. Tut. , vol.15 , Issue.1 , pp. 487-514
    • Kolias, C.1    Kambourakis, G.2    Gritzalis, S.3
  • 13
    • 33751528815 scopus 로고    scopus 로고
    • MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
    • Y. Xiao, H.-H. Chen, B. Sun, R. Wang, S. Sethi, "MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks," EURASIP J. Wireless Commun. Netw., 2006, doi: 10.1155/WCN/2006/93830.
    • (2006) EURASIP J. Wireless Commun. Netw.
    • Xiao, Y.1    Chen, H.-H.2    Sun, B.3    Wang, R.4    Sethi, S.5
  • 14
    • 0034228518 scopus 로고    scopus 로고
    • Securing electronic commerce: Reducing the SSL overhead
    • Jul.
    • G. Apostolopoulos, V. Peris, P. Pradhan, D. Saha, "Securing electronic commerce: Reducing the SSL overhead," IEEE Network, vol. 14, no. 4, pp. 8-16, Jul. 2000.
    • (2000) IEEE Network , vol.14 , Issue.4 , pp. 8-16
    • Apostolopoulos, G.1    Peris, V.2    Pradhan, P.3    Saha, D.4
  • 16
    • 0028272762 scopus 로고    scopus 로고
    • Privacy and authentication for wireless local area networks
    • Aug.
    • A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Pers. Commun., vol. 1, no. 1, pp. 25-31, Aug. 2002.
    • (2002) IEEE Pers. Commun. , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 18
    • 0034590150 scopus 로고    scopus 로고
    • A novel authentication scheme for ad hoc networks
    • Chicago, IL, USA, Sep.
    • L. Venkatraman and D. P. Agrawal, "A novel authentication scheme for ad hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., Chicago, IL, USA, Sep. 2000, pp. 1268-1273.
    • (2000) Proc IEEE Wireless Commun. Netw. Conf. , pp. 1268-1273
    • Venkatraman, L.1    Agrawal, D.P.2
  • 20
    • 22944481810 scopus 로고    scopus 로고
    • Securing Wi-Fi networks
    • Jul.
    • K. J. Hole, E. Dyrnes, P. Thorsheim, "Securing Wi-Fi networks," Computer, vol. 38, no. 7, pp. 28-34, Jul. 2005.
    • (2005) Computer , vol.38 , Issue.7 , pp. 28-34
    • Hole, K.J.1    Dyrnes, E.2    Thorsheim, P.3
  • 25
    • 38349154579 scopus 로고    scopus 로고
    • Denial-ofservice in wireless sensor networks: Attacks and defenses
    • Jan.
    • R. Raymond and S. Midkiff, "Denial-ofservice in wireless sensor networks: Attacks and defenses," IEEE Perv. Comput., vol. 7, no. 1, pp. 74-81, Jan. 2008.
    • (2008) IEEE Perv. Comput. , vol.7 , Issue.1 , pp. 74-81
    • Raymond, R.1    Midkiff, S.2
  • 26
    • 36849079903 scopus 로고    scopus 로고
    • A survey of routing attacks in mobile ad hoc networks
    • Dec.
    • B. Kannhavong et al., "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Dec. 2007.
    • (2007) IEEE Wireless Commun. , vol.14 , Issue.5 , pp. 85-91
    • Kannhavong, B.1
  • 27
    • 11244304396 scopus 로고    scopus 로고
    • A man-in-themiddle attack on UMTS
    • Philadelphia, PA, USA, Oct.
    • U. Meyer and S. Wetzel, "A man-in-themiddle attack on UMTS," in Proc. 3rd ACM Workshop Wireless Security, Philadelphia, PA, USA, Oct. 2004, pp. 90-97.
    • (2004) Proc. 3rd ACM Workshop Wireless Security , pp. 90-97
    • Meyer, U.1    Wetzel, S.2
  • 30
    • 4344674124 scopus 로고    scopus 로고
    • Quantum cryptography
    • Apr.
    • C. Elliott, "Quantum cryptography," IEEE Security Privacy, vol. 2, no. 4, pp. 57-61, Apr. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.4 , pp. 57-61
    • Elliott, C.1
  • 31
    • 84866898821 scopus 로고    scopus 로고
    • Cooperative secret key generation from phase estimation in narrowband fading channels
    • Sep.
    • Q. Wang, K. Xu, K. Ren, "Cooperative secret key generation from phase estimation in narrowband fading channels," IEEE J. Sel. Areas Commun., vol. 30, no. 9, pp. 1666-1674, Sep. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.9 , pp. 1666-1674
    • Wang, Q.1    Xu, K.2    Ren, K.3
  • 32
    • 79960864004 scopus 로고    scopus 로고
    • Adaptive wireless channel probing for shared key generation
    • Shanghai, China, Apr.
    • Y. Wei, K. Zengy, P. Mohapatra, "Adaptive wireless channel probing for shared key generation," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 2165-2173.
    • (2011) Proc. 30th Annu IEEE Int. Conf. Comput. Commun. , pp. 2165-2173
    • Wei, Y.1    Zengy, K.2    Mohapatra, P.3
  • 33
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 35
    • 84891356286 scopus 로고    scopus 로고
    • Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
    • Jun.
    • Y. Zou, X. Wang, W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE Int. Conf. Commun., Budapest, Hungary, Jun. 2013, pp. 2183-2187.
    • (2013) Proc IEEE Int. Conf. Commun., Budapest, Hungary , pp. 2183-2187
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 36
    • 84884127556 scopus 로고    scopus 로고
    • Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior
    • Whistler, Canada, Jun.
    • Y. Zou, X. Wang, W. Shen, "Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior," in Proc. 17th IEEE Int. Conf. Comput. Supported Cooperative Work in Design, Whistler, Canada, Jun. 2013, pp. 704-709.
    • (2013) Proc. 17th IEEE Int. Conf. Comput. Supported Cooperative Work in Design , pp. 704-709
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 37
    • 84880855522 scopus 로고    scopus 로고
    • Analysis on the effects of artificial noise on physical layer security
    • Haspolat, Turkey, Apr.
    • O. Cepheli, T. Maslak, G. Kurt, "Analysis on the effects of artificial noise on physical layer security," in Proc. 21st Signal Process. Commun. Appl. Conf., Haspolat, Turkey, Apr. 2013, pp. 1-4.
    • (2013) Proc. 21st Signal Process. Commun. Appl. Conf. , pp. 1-4
    • Cepheli, O.1    Maslak, T.2    Kurt, G.3
  • 39
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita, M. Ghogho, D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 40
    • 84871988892 scopus 로고    scopus 로고
    • Multiuser transmit security beamforming in wireless multiple access channels
    • Ottawa, Canada, ON, Jun.
    • J. Wu and J. Chen, "Multiuser transmit security beamforming in wireless multiple access channels," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, ON, Jun. 2012, pp. 903-906.
    • (2012) Proc IEEE Int. Conf. Commun. , pp. 903-906
    • Wu, J.1    Chen, J.2
  • 41
    • 84862635573 scopus 로고    scopus 로고
    • Distributed beamforming for physical-layer security of two-way relay networks
    • Jul.
    • H. Wang, Q. Yin, X. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.7 , pp. 3532-3545
    • Wang, H.1    Yin, Q.2    Xia, X.3
  • 42
    • 84884537599 scopus 로고    scopus 로고
    • Optimal relay selection for physical-layer security in cooperative wireless networks
    • Oct.
    • Y. Zou, X. Wang, W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.10 , pp. 2099-2111
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 43
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 44
    • 77958084079 scopus 로고    scopus 로고
    • Security and privacy in emerging wireless networks
    • Oct.
    • D. Ma and G. Tsudik, "Security and privacy in emerging wireless networks," IEEE Wireless Commun., vol. 17, no. 5, pp. 12-21, Oct. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.5 , pp. 12-21
    • Ma, D.1    Tsudik, G.2
  • 45
    • 47149105095 scopus 로고    scopus 로고
    • Security threats in wireless sensor networks
    • Jun.
    • H. Kumar, D. Sarma, A. Kar, "Security threats in wireless sensor networks," IEEE Aerosp. Electron. Syst. Mag., vol. 23, no. 6, pp. 39-45, Jun. 2008.
    • (2008) IEEE Aerosp. Electron. Syst. Mag. , vol.23 , Issue.6 , pp. 39-45
    • Kumar, H.1    Sarm, A.D.2    Kar, A.3
  • 46
    • 79955372872 scopus 로고    scopus 로고
    • Physical layer security in wireless networks: A tutorial
    • Apr.
    • Y. Shiu et al., "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
    • (2011) IEEE Wireless Commun. , vol.18 , Issue.2 , pp. 66-74
    • Shiu, Y.1
  • 47
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • Sep.
    • Y. Jiang, C. Lin, X. Shen, M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 50
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial communications systems
    • Jun.
    • D. Dzung, M. Naedele, T. Von Hoff, M. Crevatin, "Security for industrial communications systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005.
    • (2005) Proc IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.3    Crevatin, M.4
  • 51
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • Dec.
    • E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Commun., vol. 11, no. 6, pp. 38-43, Dec. 2004.
    • (2004) IEEE Wireless Commun. , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 52
    • 77951598972 scopus 로고    scopus 로고
    • CAT: Building couples to early detect node compromise attack in wireless sensor networks
    • Honolulu, HI, USA, Dec.
    • X. Lin, "CAT: Building couples to early detect node compromise attack in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., Honolulu, HI, USA, Dec. 2009, pp. 1-6.
    • (2009) Proc IEEE Global Telecommun. Conf. , pp. 1-6
    • Lin, X.1
  • 53
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct.
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 54
    • 79960556813 scopus 로고    scopus 로고
    • On a new type of denial of service attack in wireless networks: The distributed jammer network
    • Jul.
    • H. Huang, N. Ahmed, P. Karthik, "On a new type of denial of service attack in wireless networks: The distributed jammer network," IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2316-2324, Jul. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.7 , pp. 2316-2324
    • Huang, H.1    Ahmed, N.2    Karthik, P.3
  • 55
    • 4143124348 scopus 로고    scopus 로고
    • CDMA physical layer built-in security enhancement
    • Orlando, FL, USA, Oct.
    • J. Ren and T. Li, "CDMA physical layer built-in security enhancement," in Proc. IEEE 58th Veh. Technol. Conf., Orlando, FL, USA, Oct. 2003, pp. 2157-2161.
    • (2003) Proc IEEE 58th Veh. Technol. Conf. , pp. 2157-2161
    • Ren, J.1    Li, T.2
  • 57
    • 77957890222 scopus 로고    scopus 로고
    • On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
    • Oct.
    • K. Pelechrinis, C. Koufogiannakis, S. Krishnamurthy, "On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks," IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3258-3271, Oct. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.10 , pp. 3258-3271
    • Pelechrinis, K.1    Koufogiannakis, C.2    Krishnamurthy, S.3
  • 59
    • 79959372828 scopus 로고    scopus 로고
    • IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11 IEEE 802.11 Working Group
    • IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11 Working Group.2007.
    • (2007) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  • 61
    • 77954208078 scopus 로고    scopus 로고
    • LTE-advanced: Next-generation wireless broadband technology
    • Jun.
    • A. Ghosh et al., "LTE-advanced: Next-generation wireless broadband technology," IEEE Wireless Commun., vol. 17, no. 3, pp. 10-22, Jun. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.3 , pp. 10-22
    • Ghosh, A.1
  • 62
    • 77954850800 scopus 로고    scopus 로고
    • Future internet services and applications
    • Apr.
    • B. Haibo, L. Sohraby, C. Wang, "Future internet services and applications," IEEE Network, vol. 24, no. 4, pp. 4-5, Apr. 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 4-5
    • Haibo, B.1    Sohraby, L.2    Wang, C.3
  • 63
    • 84985994259 scopus 로고    scopus 로고
    • Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows
    • Feb.
    • R. Bruno and M. Conti, "Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows," IEEE Trans. Mobile Comput., vol. 7, no. 2, pp. 171-186, Feb. 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.2 , pp. 171-186
    • Bruno, R.1    Conti, M.2
  • 64
    • 0035362758 scopus 로고    scopus 로고
    • Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA
    • Jun.
    • S. Lee, G. Ahn, A. Campbell, "Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA," IEEE Commun. Mag., vol. 39, no. 6, pp. 156-165, Jun. 2001.
    • (2001) IEEE Commun. Mag. , vol.39 , Issue.6 , pp. 156-165
    • Lee, S.1    Ahn, G.2    Campbell, A.3
  • 65
    • 0035360862 scopus 로고    scopus 로고
    • Delayed Internet routing convergence
    • Aug.
    • C. Labovitz, A. Ahuja, F. Jahanian, "Delayed Internet routing convergence," IEEE/ACM Trans. Netw., vol. 9, no. 3, pp. 293-306, Aug. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.9 , Issue.3 , pp. 293-306
    • Labovitz, C.1    Ahuja, A.2    Jahanian, F.3
  • 66
    • 0036536488 scopus 로고    scopus 로고
    • Transmit diversity in 3G CDMA systems
    • Apr.
    • R. Derryberry et al., "Transmit diversity in 3G CDMA systems," IEEE Commun. Mag., vol. 40, no. 4, pp. 68-75, Apr. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.4 , pp. 68-75
    • Derryberry, R.1
  • 67
    • 84863145458 scopus 로고    scopus 로고
    • LTE-advanced modem design: Challenges and perspectives
    • Feb.
    • D. Bai et al., "LTE-advanced modem design: Challenges and perspectives," IEEE Commun. Mag., vol. 50, no. 2, pp. 178-186, Feb. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.2 , pp. 178-186
    • Bai, D.1
  • 68
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Apr.
    • S. M. Bellovin, "Security problems in the TCP/IP protocol suite," ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, Apr. 1989.
    • (1989) ACM SIGCOMM Comput. Commun. Rev. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 69
    • 77952645732 scopus 로고    scopus 로고
    • Identification of effective network features to detect Smurf attacks
    • Serdang, Malaysia, Nov.
    • G. Zargar and P. Kabiri, "Identification of effective network features to detect Smurf attacks," in Proc. IEEE Student Conf. on Res. Develop., Serdang, Malaysia, Nov. 2009, pp. 49-52.
    • (2009) Proc IEEE Student Conf. on Res. Develop. , pp. 49-52
    • Zargar, G.1    Kabiri, P.2
  • 70
    • 38049024684 scopus 로고    scopus 로고
    • An analysis of mobile WiMAX security: Vulnerabilities and solutions
    • Berlin, Germany: Springer-Verlag
    • T. Shon and W. Choi, "An analysis of mobile WiMAX security: Vulnerabilities and solutions," in Network-Based Information Systems Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2007, vol. 4658, pp. 88-97.
    • (2007) Network-Based Information Systems Lecture Notes in Computer Science , vol.4658 , pp. 88-97
    • Shon, T.1    Choi, W.2
  • 71
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Jun.
    • A. Perrig, J. Stankovic, D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, Jun. 2004.
    • (2004) Commun ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 72
    • 72949104155 scopus 로고    scopus 로고
    • A survey on jamming attacks and countermeasures in WSNs
    • Dec.
    • A. Mpitziopoulos, "A survey on jamming attacks and countermeasures in WSNs," IEEE Commun. Surv. Tut., vol. 11, no. 4, pp. 42-56, Dec. 2009.
    • (2009) IEEE Commun. Surv. Tut. , vol.11 , Issue.4 , pp. 42-56
    • Mpitziopoulos, A.1
  • 73
    • 77951260465 scopus 로고    scopus 로고
    • Using power hopping to counter MAC spoof attacks in WLAN
    • Las Vegas, NV, USA, Jan.
    • V. Nagarajan and D. Huang, "Using power hopping to counter MAC spoof attacks in WLAN," in Proc. IEEE Consumer Commun. Netw. Conf., Las Vegas, NV, USA, Jan. 2010, pp. 1-5.
    • (2010) Proc IEEE Consumer Commun. Netw. Conf. , pp. 1-5
    • Nagarajan, V.1    Huang, D.2
  • 74
    • 34250307702 scopus 로고    scopus 로고
    • A novel classification scheme for 802.11 WLAN active attacking traffic patterns
    • Las Vegas, NV, USA, Apr.
    • W. Zhou, A. Marshall, Q. Gu, "A novel classification scheme for 802.11 WLAN active attacking traffic patterns," in Proc. IEEE Wireless Commun. Netw. Conf., Las Vegas, NV, USA, Apr. 2006, pp. 623-628.
    • (2006) Proc IEEE Wireless Commun. Netw. Conf. , pp. 623-628
    • Zhou, W.1    Marshall, A.2    Gu, Q.3
  • 75
    • 36348985651 scopus 로고    scopus 로고
    • Securing Ad Hoc wireless networks against data injection attacks using firewalls
    • Hongkong, China, Apr.
    • J. Park and S. Kasera, "Securing Ad Hoc wireless networks against data injection attacks using firewalls," in Proc. IEEE Wireless Commun. Netw. Conf., Hongkong, China, Apr. 2007, pp. 2843-2848.
    • (2007) Proc IEEE Wireless Commun. Netw. Conf. , pp. 2843-2848
    • Park, J.1    Kasera, S.2
  • 76
  • 78
    • 0032645074 scopus 로고    scopus 로고
    • TCP/IP security threats and attack methods
    • Jun.
    • B. Harrisa and R. Hunt, "TCP/IP security threats and attack methods," Comput. Commun., vol. 22, no. 10, pp. 885-897, Jun. 1999.
    • (1999) Comput. Commun. , vol.22 , Issue.10 , pp. 885-897
    • Harrisa, B.1    Hunt, R.2
  • 79
    • 33847663819 scopus 로고    scopus 로고
    • Active router approach to defeating denial-of-service attacks in networks
    • Feb.
    • F. El-Moussa, N. Linge, M. Hope, "Active router approach to defeating denial-of-service attacks in networks," IET Commun., vol. 1, no. 1, pp. 55-63, Feb. 2007.
    • (2007) IET Commun. , vol.1 , Issue.1 , pp. 55-63
    • El-Moussa, F.1    Linge, N.2    Hope, M.3
  • 80
    • 0030715989 scopus 로고    scopus 로고
    • Analysis of a denial of service attack on TCP
    • Oakland, USA, May
    • C. Schuba et al., "Analysis of a denial of service attack on TCP," in Proc. IEEE Symp. Security Privacy, Oakland, USA, May 1997, pp. 208-223.
    • (1997) Proc IEEE Symp. Security Privacy , pp. 208-223
    • Schuba, C.1
  • 81
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks and counter strategies
    • Aug.
    • A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies," IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683-696, Aug. 2006.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.4 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 82
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • Oct.
    • R. Chang, "Defending against flooding-based distributed denial-of-service attacks: A tutorial," IEEE Commun. Mag., vol. 40, no. 10, pp. 42-51, Oct. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.1
  • 83
    • 85089748801 scopus 로고    scopus 로고
    • RFC 2577 May [Online] Available
    • RFC 2577, "FTP security considerations," May 1999. [Online]. Available: http://tools. ietf.org/html/rfc2577
    • (1999) FTP Security Considerations
  • 84
    • 0032023572 scopus 로고    scopus 로고
    • E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity
    • Mar.
    • T. Bass, A. Freyre, D. Gruber, G. Watt, "E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity," IEEE Network, vol. 12, no. 2, pp. 10-17, Mar. 1998.
    • (1998) IEEE Network , vol.12 , Issue.2 , pp. 10-17
    • Bass, T.1    Freyre, A.2    Gruber, D.3    Watt, G.4
  • 85
    • 77949879017 scopus 로고    scopus 로고
    • Automatic creation of SQL injection and cross-site scripting attacks
    • Vancouver, Canada BC, May
    • A. Kieyzun, P. Guo, K. Jayaraman, M. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," in Proc. IEEE 31st Int. Conf. Softw. Eng., Vancouver, Canada BC, May 2009, pp. 199-209.
    • (2009) Proc IEEE 31st Int. Conf. Softw. Eng. , pp. 199-209
    • Kieyzun, A.1    Guo, P.2    Jayaraman, K.3    Ernst, M.4
  • 86
    • 85008048349 scopus 로고    scopus 로고
    • IEEE 802.22: The first cognitive radio wireless regional area network standard
    • Jan.
    • C. Stevenson et al., "IEEE 802.22: The first cognitive radio wireless regional area network standard," IEEE Commun. Mag., vol. 47, no. 1, pp. 130-138, Jan. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.1 , pp. 130-138
    • Stevenson, C.1
  • 87
    • 16244399493 scopus 로고    scopus 로고
    • Bluetooth and Wi-Fi wireless protocols: A survey and a comparison
    • Feb.
    • E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun., vol. 12, no. 1, pp. 12-26, Feb. 2005.
    • (2005) IEEE Wireless Commun. , vol.12 , Issue.1 , pp. 12-26
    • Ferro, E.1    Potorti, F.2
  • 88
    • 84873712223 scopus 로고    scopus 로고
    • A Survey on security for mobile devices
    • Mar.
    • M. Polla, F. Martinelli, D. Sgandurra, "A Survey on security for mobile devices," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 446-471, Mar. 2013.
    • (2013) IEEE Commun. Surv. Tut. , vol.15 , Issue.1 , pp. 446-471
    • Polla, M.1    Martinelli, F.2    Sgandurra, D.3
  • 89
    • 84879880382 scopus 로고    scopus 로고
    • The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX
    • Oct.
    • D. Pareit, I. Moerman, P. Demeester, "The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX," IEEE Commun. Surv. Tut., vol. 14, no. 4, pp. 1183-1211, Oct. 2012.
    • (2012) IEEE Commun. Surv. Tut. , vol.14 , Issue.4 , pp. 1183-1211
    • Pareit, D.1    Moerman, I.2    Demeester, P.3
  • 90
    • 84905923583 scopus 로고    scopus 로고
    • A survey on security aspects for LTE and LTE-A networks
    • Apr.
    • J. Cao, H. Ma, H. Li, Y. Zhang, "A survey on security aspects for LTE and LTE-A networks," IEEE Commun. Surv. Tut., vol. 15, no. 2, Apr. 2013.
    • (2013) IEEE Commun. Surv. Tut. , vol.15 , Issue.2
    • Cao, J.1    Ma, H.2    Li, H.3    Zhang, Y.4
  • 91
    • 0009402121 scopus 로고    scopus 로고
    • Jul. [Online] Available
    • T. Muller, "Bluetooth Security Architecture," Jul. 1999. [Online]. Available: http://www.afn.org/afn48922/downs/wireless/1c11600.pdf
    • (1999) Bluetooth Security Architecture
    • Muller, T.1
  • 95
    • 70449623670 scopus 로고    scopus 로고
    • Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)
    • Singapore, May
    • A. Lashkari, M. Mansoor, A. Danesh, "Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)," in Proc. Int. Conf. Signal Process. Syst., Singapore, May 2009, pp. 445-449.
    • (2009) Proc. Int. Conf. Signal Process. Syst. , pp. 445-449
    • Lashkari, A.1    Mansoor, M.2    Danesh, A.3
  • 96
    • 43749124190 scopus 로고    scopus 로고
    • Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP
    • Xiamen, China, Nov.
    • J. Lee and C. Fan, "Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP," in Proc. Int. Symp. Intell. Signal Process. Commun. Syst., Xiamen, China, Nov. 2007, pp. 56-59.
    • (2007) Proc. Int. Symp. Intell. Signal Process. Commun. Syst. , pp. 56-59
    • Lee, J.1    Fan, C.2
  • 97
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
    • May
    • A. Stubbleleld, J. Ioannidis, A. D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," ACM Trans. Inf. Syst. Security, vol. 7, no. 2, pp. 319-332, May 2004.
    • (2004) ACM. Trans. Inf. Syst. Security , vol.7 , Issue.2 , pp. 319-332
    • Stubbleleld, A.1    Ioannidis, J.2    Rubin, A.D.3
  • 100
    • 0037766154 scopus 로고    scopus 로고
    • Security flaws in 802.11 data link protocols
    • May
    • C. Nancy, H. Russ, W. David, W. Jesse, "Security flaws in 802.11 data link protocols," Commun. ACM, vol. 46, no. 5, pp. 35-39, May 2003.
    • (2003) Commun ACM , vol.46 , Issue.5 , pp. 35-39
    • Nancy, C.1    Russ, H.2    David, W.3    Jesse, W.4
  • 101
    • 70349147400 scopus 로고    scopus 로고
    • Practical attacks against WEP and WPA
    • Zurich, Switzerland, Mar.
    • E. Tews and M. Beck, "Practical attacks against WEP and WPA," in Proc. 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, Mar. 2009, pp. 79-86.
    • (2009) Proc. 2nd ACM Conf. Wireless Netw. Security , pp. 79-86
    • Tews, E.1    Beck, M.2
  • 102
    • 67651085197 scopus 로고    scopus 로고
    • Advancement of MIMO technology in WiMAX: From IEEE 802.16d/e/j to 802.16m
    • Jun.
    • Q. Li, X. Lin, J. Zhang, W. Roh, "Advancement of MIMO technology in WiMAX: From IEEE 802.16d/e/j to 802.16m," IEEE Commun. Mag., vol. 47, no. 6, pp. 100-107, Jun. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.6 , pp. 100-107
    • Li, Q.1    Lin, X.2    Zhang, J.3    Roh, W.4
  • 103
    • 67650679649 scopus 로고    scopus 로고
    • Analysis of mobile WiMAX security: Vulnerabilities and solutions
    • Atlanta, GA, USA, Sep.
    • T. Han et al., "Analysis of mobile WiMAX security: Vulnerabilities and solutions," in Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., Atlanta, GA, USA, Sep. 2008, pp. 828-833.
    • (2008) Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst. , pp. 828-833
    • Han, T.1
  • 104
    • 80054910459 scopus 로고    scopus 로고
    • Comparative analysis on TEK exchange between PKMv1 and PKMV2 for WiMAX
    • Wuhan, China, Sep.
    • F. Yang, "Comparative analysis on TEK exchange between PKMv1 and PKMV2 for WiMAX," in Proc. 7th Int. Conf. Wireless Commun. Netw. Mobile Comput., Wuhan, China, Sep. 2011, pp. 1-4.
    • (2011) Proc. 7th Int. Conf. Wireless Commun. Netw. Mobile Comput. , pp. 1-4
    • Yang, F.1
  • 105
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 security
    • Jun.
    • D. Johnston and J. Walker, "Overview of IEEE 802.16 security," IEEE Security Privacy, vol. 2, no. 3, pp. 40-48, Jun. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 40-48
    • Johnston, D.1    Walker, J.2
  • 106
    • 34250839908 scopus 로고    scopus 로고
    • Authentication authorization and accounting (AAA) schemes in WiMAX
    • May
    • S. Adibi et al., "Authentication authorization and accounting (AAA) schemes in WiMAX," in Proc. IEEE Int. Conf. Electroinf. Technol.,May 2006, pp. 210-215.
    • (2006) Proc IEEE Int. Conf. Electroinf. Technol. , pp. 210-215
    • Adibi, S.1
  • 107
    • 84947914301 scopus 로고    scopus 로고
    • A fast new des implementation in software
    • Haifa, Israel, Jan.
    • E. Biham, "A fast new DES implementation in software," in Proc. 4th Int. Workshop Fast Softw. Encryption, Haifa, Israel, Jan. 1997, pp. 260-272.
    • (1997) Proc. 4th Int. Workshop Fast Softw. Encryption , pp. 260-272
    • Biham, E.1
  • 108
    • 84983735284 scopus 로고    scopus 로고
    • Security Boca Raton FL: CRC Press
    • S. Ahson and M. Ilyas, WiMAX Standards and Security, Boca Raton, FL: CRC Press, 2007.
    • (2007) WiMAX Standards
    • Ahson, S.1    Ilyas, M.2
  • 109
    • 67349139858 scopus 로고    scopus 로고
    • LTE: The evolution of mobile broadband
    • Apr.
    • D. Astely et al., "LTE: The evolution of mobile broadband," IEEE Commun. Mag., vol. 47, no. 4, pp. 44-51, Apr. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.4 , pp. 44-51
    • Astely, D.1
  • 111
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Mar.
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 114
    • 82055172108 scopus 로고    scopus 로고
    • On the sliding property of SNOW 3G and SNOW 2.0
    • Dec.
    • A. Kircanski and A. Youssef, "On the sliding property of SNOW 3G and SNOW 2.0," IET Inf. Security, vol. 5, no. 4, pp. 199-206, Dec. 2011.
    • (2011) IET Inf. Security , vol.5 , Issue.4 , pp. 199-206
    • Kircanski, A.1    Youssef, A.2
  • 115
    • 0031188901 scopus 로고    scopus 로고
    • Rayleigh fading channels in mobile digital communication systems-Part I: Characterization
    • Jul.
    • B. Sklar, "Rayleigh fading channels in mobile digital communication systems-Part I: Characterization," IEEE Commun. Mag., vol. 35, no. 7, pp. 90-100, Jul. 1997.
    • (1997) IEEE Commun. Mag. , vol.35 , Issue.7 , pp. 90-100
    • Sklar, B.1
  • 116
    • 0035273711 scopus 로고    scopus 로고
    • On the estimation of the K parameter for the rice fading distribution
    • Mar.
    • A. Abdi, C. Tepedelenlioglu, M. Kaveh, G. Giannakis, "On the estimation of the K parameter for the rice fading distribution," IEEE Commun. Lett., vol. 5, no. 3, pp. 92-94, Mar. 2001.
    • (2001) IEEE Commun. Lett. , vol.5 , Issue.3 , pp. 92-94
    • Abdi, A.1    Tepedelenlioglu, C.2    Kaveh, M.3    Giannakis, G.4
  • 117
    • 0032671513 scopus 로고    scopus 로고
    • On higher order statistics of the Nakagami-m distribution
    • May
    • M. D. Yacoub, J. E. V. Bautista, L. Guerra de Rezende Guedes, "On higher order statistics of the Nakagami-m distribution," IEEE Trans. Veh. Technol., vol. 48, no. 3, pp. 790-794, May 1999.
    • (1999) IEEE Trans. Veh. Technol. , vol.48 , Issue.3 , pp. 790-794
    • Yacoub, M.D.1    Bautista, J.E.V.2    De Guerra, G.R.L.3
  • 118
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • Atlantic City, NJ, USA
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. IEEE Military Commun. Conf., Atlantic City, NJ, USA, 2005, pp. 1501-1506.
    • (2005) Proc IEEE Military Commun. Conf. , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 119
    • 84890522850 scopus 로고
    • Communications theory of secrecy systems
    • C. E. Shannon, "Communications theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 121
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 122
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 124
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 125
    • 84863410145 scopus 로고    scopus 로고
    • MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom
    • Houston, TX, USA, Dec.
    • X. He, A. Khisti, A. Yener, "MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom," in Proc. IEEE Global Telecommun. Conf., Houston, TX, USA, Dec. 2011, pp. 1-5.
    • (2011) Proc IEEE Global Telecommun. Conf. , pp. 1-5
    • He, X.1    Khisti, A.2    Yener, A.3
  • 126
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jul.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jul. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 127
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Aug.
    • X. Zhou and M. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Aug. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.2
  • 128
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
    • Mar.
    • W. Liao, T. Chang, W. Ma, C. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.1    Chang, T.2    Ma, W.3    Chi, C.4
  • 129
    • 80051621580 scopus 로고    scopus 로고
    • A robust artificial noise aided transmit design for MISO secrecy
    • Prague, Czech Republic, May
    • Q. Li and W. Ma, "A robust artificial noise aided transmit design for MISO secrecy," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Prague, Czech Republic, May 2011, pp. 3436-3439.
    • (2011) Proc IEEE Int. Conf. Acoust. Speech Signal Process. , pp. 3436-3439
    • Li, Q.1    Ma, W.2
  • 130
    • 82055177123 scopus 로고    scopus 로고
    • Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
    • Oct.
    • D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Oct. 2011.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.10 , pp. 2067-2076
    • Goeckel, D.1
  • 131
    • 77955366092 scopus 로고    scopus 로고
    • Collaborative relay beamforming for secrecy
    • Cape Town, South Africa, May
    • J. Zhang and M. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-5.
    • (2010) Proc IEEE Int. Conf. Commun. , pp. 1-5
    • Zhang, J.1    Gursoy, M.2
  • 132
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in MIMO wiretap channels with imperfect CSI
    • Jan.
    • A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.2
  • 133
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I. Kim, K. Dong, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.2    Dong, K.3
  • 134
    • 84861601547 scopus 로고    scopus 로고
    • Strobe: Actively securing wireless communications using zero-forcing beamforming
    • Orlando, FL, USA, Mar.
    • N. Anand, S.-J. Lee, E. W. Knightly, "Strobe: Actively securing wireless communications using zero-forcing beamforming," in Proc. 31st IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 720-728.
    • (2012) Proc. 31st IEEE INFOCOM , pp. 720-728
    • Anand, N.1    Lee, S.-J.2    Knightly, E.W.3
  • 135
    • 80052009529 scopus 로고    scopus 로고
    • Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications in Proc
    • Kyoto, Japan, Jun.
    • H. Qin et al., "Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications in Proc. IEEE Int. Conf. Commun. Workshops, Kyoto, Japan, Jun. 2011, pp. 1-5.
    • (2011) IEEE Int. Conf. Commun. Workshops , pp. 1-5
    • Qin, H.1
  • 136
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita, M. Ghogho, D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 137
    • 84921832973 scopus 로고    scopus 로고
    • Improving diversity for physical-layer security in wireless communications
    • Jan.
    • Y. Zou, J. Zhu, X. Wang, V. Leung, "Improving diversity for physical-layer security in wireless communications," IEEE Network, vol. 29, no. 1, pp. 42-48, Jan. 2015.
    • (2015) IEEE Network , vol.29 , Issue.1 , pp. 42-48
    • Zou, Y.1    Zhu, J.2    Wang, X.3    Leung, V.4
  • 138
    • 0038363341 scopus 로고    scopus 로고
    • Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels
    • May
    • L. Zheng and D. Tse, "Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1073-1096, May 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.5 , pp. 1073-1096
    • Zheng, L.1    Tse, D.2
  • 139
    • 0032183752 scopus 로고    scopus 로고
    • A simple transmitter diversity scheme for wireless communications
    • Oct.
    • S. Alamouti, "A simple transmitter diversity scheme for wireless communications," IEEE J. Sel. Areas Commun., vol. 16, no. 8, pp. 1451-1458, Oct. 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.8 , pp. 1451-1458
    • Alamouti, S.1
  • 140
    • 84866292458 scopus 로고    scopus 로고
    • Orthogonal frequency division multiple access in WiMAX and LTE: A comparison
    • Sep.
    • S. Srikanth, P. A. Murugesa, X. Fernando, "Orthogonal frequency division multiple access in WiMAX and LTE: A comparison," IEEE Commun. Mag., vol. 50, no. 9, pp. 153-161, Sep. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.9 , pp. 153-161
    • Srikanth, S.1    Murugesa, P.A.2    Fernando, X.3
  • 142
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 143
    • 0345258506 scopus 로고    scopus 로고
    • User cooperation diversity-Part I: System description
    • Nov.
    • A. Sendonaris, E. Erkip, B. Aazhang, "User cooperation diversity-Part I: System description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
    • (2003) IEEE Trans. Commun. , vol.51 , Issue.11 , pp. 1927-1938
    • Sendonaris, A.1    Erkip, E.2    Aazhang, B.3
  • 144
    • 84858300925 scopus 로고    scopus 로고
    • Opportunistic distributed space-time coding for decode-and-forward cooperation systems
    • Apr.
    • Y. Zou, Y.-D. Yao, B. Zheng, "Opportunistic distributed space-time coding for decode-and-forward cooperation systems," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1766-1781, Apr. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1766-1781
    • Zou, Y.1    Yao, Y.-D.2    Zheng, B.3
  • 145
    • 84919667792 scopus 로고    scopus 로고
    • Secrecy outage and diversity analysis of cognitive radio systems
    • Nov.
    • Y. Zou, X. Li, Y.-C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.11 , pp. 2222-2236
    • Zou, Y.1    Li, X.2    Liang, Y.-C.3
  • 146
    • 80052337836 scopus 로고    scopus 로고
    • Secret key generation exploiting channel characteristics in wireless communications
    • Aug.
    • K. Ren, H. Su, Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, Aug. 2011.
    • (2011) IEEE Wireless Commun. , vol.18 , Issue.4 , pp. 6-12
    • Ren, K.1    Su, H.2    Wang, Q.3
  • 147
    • 0032118152 scopus 로고    scopus 로고
    • Robust channel estimation for OFDM systems with rapid dispersive fading channels
    • Aug.
    • Y. Li, L. J. Cimini, N. R. Sollenberger, "Robust channel estimation for OFDM systems with rapid dispersive fading channels," IEEE Trans. Commun., vol. 46, no. 7, pp. 902-915, Aug. 2002.
    • (2002) IEEE Trans. Commun. , vol.46 , Issue.7 , pp. 902-915
    • Li, Y.1    Cimini, L.J.2    Sollenberger, N.R.3
  • 148
    • 0036648042 scopus 로고    scopus 로고
    • Subspace-based blind and semi-blind channel estimation for OFDM systems
    • Jul.
    • B. Muquet, M. Courville, P. Duhamel, "Subspace-based blind and semi-blind channel estimation for OFDM systems," IEEE Trans. Signal Process., vol. 50, no. 7, pp. 1699-1712, Jul. 2002.
    • (2002) IEEE Trans. Signal Process. , vol.50 , Issue.7 , pp. 1699-1712
    • Muquet, B.1    Courville, M.2    Duhamel, P.3
  • 149
    • 0029720059 scopus 로고    scopus 로고
    • Diffie-Hellman key distribution extended to group communication
    • New Delhi, India, Mar.
    • M. Steiner, G. Tsudik, M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. 3rd ACM Conf. Comput. Commun. Security, New Delhi, India, Mar. 1996, pp. 31-37.
    • (1996) Proc. 3rd ACM Conf. Comput. Commun. Security , pp. 31-37
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 150
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan.
    • J. E. Hershey, A. A. Hassan, R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 152
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • San Francisco, CA, USA Sep.
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. 14th Annu. Int. Conf. Mobile Comput. Netw., San Francisco, CA, USA, Sep. 2008, pp. 128-139.
    • (2008) Proc. 14th Annu. Int. Conf. Mobile Comput. Netw. , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 153
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • Beijing, China, Sep.
    • S. Jana et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. 15th Annu. Int. Conf. Mobile Comput. Netw., Beijing, China, Sep. 2009, pp. 321-332.
    • (2009) Proc. 15th Annu. Int. Conf. Mobile Comput. Netw. , pp. 321-332
    • Jana, S.1
  • 154
    • 79960857245 scopus 로고    scopus 로고
    • Physical layer wireless security made fast and channel independent
    • Shanghai, China, Apr.
    • S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 1125-1133.
    • (2011) Proc. 30th Annu IEEE Int. Conf. Comput. Commun. , pp. 1125-1133
    • Gollakota, S.1    Katabi, D.2
  • 155
    • 84861623350 scopus 로고    scopus 로고
    • Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
    • Orlando, FL, USA, Mar.
    • H. Liu, J. Yang, Y. Wang, Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in Proc. 31st Annu. IEEE Int. Conf. Comput. Commun., Orlando, FL, USA, Mar. 2012, pp. 927-935.
    • (2012) Proc. 31st Annu IEEE Int. Conf. Comput. Commun. , pp. 927-935
    • Liu, H.1    Yang, J.2    Wang, Y.3    Chen, Y.4
  • 156
    • 84880741440 scopus 로고    scopus 로고
    • Intelligent mechanisms for key generation from multipath wireless channels
    • New York, NY, USA, Apr.
    • Y. Shehadeh, O. Alfandi, K. Tout, D. Hogrefe, "Intelligent mechanisms for key generation from multipath wireless channels," in Proc. Wireless Telecommun. Symp., New York, NY, USA, Apr. 2011, pp. 1-6.
    • (2011) Proc. Wireless Telecommun. Symp. , pp. 1-6
    • Shehadeh, Y.1    Alfandi, O.2    Tout, K.3    Hogrefe, D.4
  • 157
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Shanghai, China, Mar.
    • Q. Wang, H. Su, K. Ren, K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Mar. 2011, pp. 1422-1430.
    • (2011) Proc. 30th Annu IEEE Int. Conf. Comput. Commun. , pp. 1422-1430
    • Wang, Q.1    Su, H.2    Ren, K.3    Kim, K.4
  • 158
    • 70349883977 scopus 로고    scopus 로고
    • Key generation exploiting MIMO channel evolution: Algorithm and theoretical limits
    • Berlin, Germany. Mar.
    • J. W. Wallace, C. Chen, M. A. Jensen, "Key generation exploiting MIMO channel evolution: Algorithm and theoretical limits," in Proc. 3rd Eur. Conf. Antennas Propag., Berlin, Germany, Mar. 2009, pp. 1499-1503.
    • (2009) Proc. 3rd Eur. Conf. Antennas Propag. , pp. 1499-1503
    • Wallace, J.W.1    Chen, C.2    Jensen, M.A.3
  • 159
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • San Diego, CA, USA, Mar.
    • K. Zeng, D. Wu, A. Chan, P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010.
    • (2010) Proc. 29th Annu IEEE Int. Conf. Comput. Commun.
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 160
    • 80051749392 scopus 로고    scopus 로고
    • Physical-layer secret key agreement in two-way wireless relaying systems
    • Sep.
    • T. Shimizu, H. Iwai, H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forens. Security , vol.6 , Issue.3 , pp. 650-660
    • Shimizu, T.1    Iwai, H.2    Sasaoka, H.3
  • 161
    • 79957837002 scopus 로고    scopus 로고
    • On passive inference attacks against physical-layer key extraction
    • Salzburg,Austria, Apr.
    • M. Edman, A. Kiayias, B. Yener, "On passive inference attacks against physical-layer key extraction?" in Proc. 4th Eur.WorkshopSyst. Security,Salzburg,Austria, Apr. 2011, doi: 10.1145/1972551.1972559.
    • (2011) Proc. 4th Eur.WorkshopSyst. Security
    • Edman, M.1    Kiayias, A.2    Yener, B.3
  • 162
    • 84865611232 scopus 로고    scopus 로고
    • A practical man-in-the-middle attack on signal-based key generation protocols
    • S. Eberz, M. Strohmeier, M. Wilhelm, I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," Comput. Security, pp. 235-252, 2012.
    • (2012) Comput. Security , pp. 235-252
    • Eberz, S.1    Strohmeier, M.2    Wilhelm, M.3    Martinovic, I.4
  • 163
    • 84879516937 scopus 로고    scopus 로고
    • ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
    • Budapest, Hungary, Apr.
    • L. Shi et al., "ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks," in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw., Budapest, Hungary, Apr. 2013, pp. 155-166.
    • (2013) Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw. , pp. 155-166
    • Shi, L.1
  • 164
    • 80051801375 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • May
    • K. Pelechrinis, M. Iliofotou, S. V. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surv. Tut., vol. 13, no. 2, pp. 245-257, May 2011.
    • (2011) IEEE Commun. Surv. Tut. , vol.13 , Issue.2 , pp. 245-257
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, S.V.3
  • 166
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • Urbana-Champaign, IL, USA,May
    • W. Xu, W. Trappe, Y. Zhang, T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana-Champaign, IL, USA,May 2005, pp. 46-57.
    • (2005) Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 167
    • 0021422462 scopus 로고
    • Frequency hopping with multiple frequency-shift keying and hard decisions
    • May
    • D. J. Torrieri, "Frequency hopping with multiple frequency-shift keying and hard decisions," IEEE Trans. Commun., vol. 32, no. 5, pp. 574-582, May 1984.
    • (1984) IEEE Trans. Commun. , vol.32 , Issue.5 , pp. 574-582
    • Torrieri, D.J.1
  • 169
    • 36949015142 scopus 로고    scopus 로고
    • Understanding and mitigating the impact of RF interference on 802.11 networks
    • Kyoto, Japan, Aug.
    • R. Gummadi, D. Wetheral, B. Greenstein, S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," in Proc. ACM SIGCOMM 2007, Kyoto, Japan, Aug. 2007, pp. 385-396.
    • (2007) Proc. ACM SIGCOMM 2007 , pp. 385-396
    • Gummadi, R.1    Wetheral, D.2    Greenstein, B.3    Seshan, S.4
  • 170
    • 0036647867 scopus 로고    scopus 로고
    • Direction finding in the presence of an intermittent interference
    • Jul.
    • O. Besson, P. Stoica, Y. Kamiya, "Direction finding in the presence of an intermittent interference," IEEE Trans. Signal Process., vol. 50, no. 7, pp. 1554-1564, Jul. 2002.
    • (2002) IEEE Trans. Signal Process. , vol.50 , Issue.7 , pp. 1554-1564
    • Besson, O.1    Stoica, P.2    Kamiya, Y.3
  • 171
    • 84861602103 scopus 로고    scopus 로고
    • BitTrickle: Defending against broadband and high-power reactive jamming attacks
    • Orlando, FL, USA, Mar.
    • Y. Liu and P. Ning, "BitTrickle: Defending against broadband and high-power reactive jamming attacks," in Proc. 31st Annu. IEEE Int. Conf. Comput. Commun., Orlando, FL, USA, Mar. 2012, pp. 909-917.
    • (2012) Proc. 31st Annu IEEE Int. Conf. Comput. Commun. , pp. 909-917
    • Liu, Y.1    Ning, P.2
  • 172
    • 0031236830 scopus 로고    scopus 로고
    • A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system
    • Sep.
    • E. Lance and G. K. Kaleh, "A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system," IEEE Trans. Commun., vol. 45, no. 9, pp. 1123-1129, Sep. 1997.
    • (1997) IEEE Trans. Commun. , vol.45 , Issue.9 , pp. 1123-1129
    • Lance, E.1    Kaleh, G.K.2
  • 173
    • 0035493270 scopus 로고    scopus 로고
    • Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication
    • Oct.
    • L. Freitag, M. Stojanovic, S. Singh, M. Johnson, "Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication," IEEE J. Ocean. Eng., vol. 26, no. 4, pp. 586-593, Oct. 2001.
    • (2001) IEEE J. Ocean. Eng. , vol.26 , Issue.4 , pp. 586-593
    • Freitag, L.1    Stojanovic, M.2    Singh, S.3    Johnson, M.4
  • 174
    • 84856967268 scopus 로고    scopus 로고
    • Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN
    • Baltimore, MD, USA, Nov.
    • J. Jeung, S. Jeong, J. Lim, "Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN," in Proc. Military Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 1231-1236.
    • (2011) Proc. Military Commun. Conf. , pp. 1231-1236
    • Jeung, J.1    Jeong, S.2    Lim, J.3
  • 175
    • 84891786182 scopus 로고    scopus 로고
    • An error-minimizing framework for localizing jammers in wireless networks
    • Feb.
    • Z. Liu, H. Liu, W. Xu, Y. Chen, "An error-minimizing framework for localizing jammers in wireless networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 508-517, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 508-517
    • Liu, Z.1    Liu, H.2    Xu, W.3    Chen, Y.4
  • 176
    • 0031237594 scopus 로고    scopus 로고
    • IEEE 802.11 wireless local area networks
    • Sep.
    • B. P. Crow, I. Widjaja, J. G. Kim, P. T. Sakai, "IEEE 802.11 wireless local area networks," IEEE Commun. Mag., vol. 35, no. 9, pp. 116-126, Sep. 1997.
    • (1997) IEEE Commun. Mag. , vol.35 , Issue.9 , pp. 116-126
    • Crow, B.P.1    Widjaja, I.2    Kim, J.G.3    Sakai, P.T.4
  • 177
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Mar.
    • G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2003.
    • (2003) IEEE J. Sel. Areas Commun. , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 180
    • 56749098358 scopus 로고    scopus 로고
    • Identifying unique devices through wireless fingerprinting
    • Alexandria, VA, USA, Mar.
    • D. Loh, C. Cho, C. Tan, R. Lee, "Identifying unique devices through wireless fingerprinting," in Proc. 1st ACM Conf. Wireless Netw. Security, Alexandria, VA, USA, Mar. 2008, pp. 46-55.
    • (2008) Proc. 1st ACM Conf. Wireless Netw. Security , pp. 46-55
    • Loh, D.1    Cho, C.2    Tan, C.3    Lee, R.4
  • 182
    • 84901454675 scopus 로고    scopus 로고
    • Physical layer authentication for mobile systems with time-varying carrier frequency offsets
    • May
    • W. Hou, X. Wang, J.-Y. Chouinard, A. Refaey, "Physical layer authentication for mobile systems with time-varying carrier frequency offsets," IEEE Trans. Commun., vol. 62, no. 5, pp. 1658-1667, May 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.5 , pp. 1658-1667
    • Hou, W.1    Wang, X.2    Chouinard, J.-Y.3    Refaey, A.4
  • 183
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • Jul.
    • L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 184
    • 84861598237 scopus 로고    scopus 로고
    • Enhanced wireless channel authentication using time-synched link signature
    • Shanghai, China, Mar.
    • Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in Proc. IEEE Int. Conf. Comput. Commun., Shanghai, China, Mar. 2012, pp. 2636-2640.
    • (2012) Proc IEEE Int. Conf. Comput. Commun. , pp. 2636-2640
    • Liu, Y.1    Ning, P.2
  • 185
    • 84887106886 scopus 로고    scopus 로고
    • SecureArray: Improving WiFi security with fine-grained physical-layer information
    • Miami, FL, USA, Sep.
    • J. Xiong and K. Jamieson, "SecureArray: Improving WiFi security with fine-grained physical-layer information," in Proc. 19th ACM Int. Conf. Mobile Comput. Netw., Miami, FL, USA, Sep. 2013, pp. 441-452.
    • (2013) Proc. 19th ACM Int. Conf. Mobile Comput. Netw. , pp. 441-452
    • Xiong, J.1    Jamieson, K.2
  • 186
    • 84904439278 scopus 로고    scopus 로고
    • Physical layer challenge-response authentication in wireless networks with relay
    • Toronto, ON, Canada, Mar.
    • X. Du, D. Shan, K. Zeng, L. Huie, "Physical layer challenge-response authentication in wireless networks with relay," in Proc. IEEE Int. Conf. Comput. Commun., Toronto, ON, Canada, Mar. 2014, pp. 1276-1284.
    • (2014) Proc. IEEE Int. Conf. Comput. Commun. , pp. 1276-1284
    • Du, X.1    Shan, D.2    Zeng, K.3    Huie, L.4
  • 188
    • 80051769332 scopus 로고    scopus 로고
    • MIMO authentication via deliberate fingerprinting at the physical layer
    • Mar.
    • P. Yu and B. Sadler, "MIMO authentication via deliberate fingerprinting at the physical layer," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 606-615, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forens. Security , vol.6 , Issue.3 , pp. 606-615
    • Yu, P.1    Sadler, B.2
  • 189
    • 84933526458 scopus 로고    scopus 로고
    • Wireless physical layer authentication via fingerprint embedding
    • Jun.
    • P. Yu, G. Verma, B. Sadler, "Wireless physical layer authentication via fingerprint embedding," IEEE Commun. Mag., vol. 53, no. 6, pp. 48-53, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 48-53
    • Yu, P.1    Verm, A.G.2    Sadler, B.3
  • 192
    • 77953313388 scopus 로고    scopus 로고
    • Secure wireless communication with dynamic secrets
    • San Diego, CA, USA, Mar.
    • S. Xiao, W. Gong, D. Towsley, "Secure wireless communication with dynamic secrets," in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1-9.
    • (2010) Proc IEEE INFOCOM , pp. 1-9
    • Xiao, S.1    Gong, W.2    Towsley, D.3
  • 193
    • 84879917851 scopus 로고    scopus 로고
    • ARQ-based symmetric key generation over correlated erasure channels
    • Jul.
    • Y. Khiabani and S. Wei, "ARQ-based symmetric key generation over correlated erasure channels," IEEE Trans. Inf. Forens. Security, vol. 8, no. 7, pp. 1152-1161, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forens. Security , vol.8 , Issue.7 , pp. 1152-1161
    • Khiabani, Y.1    Wei, S.2
  • 194
    • 62149116869 scopus 로고    scopus 로고
    • Network access security in next generation 3GPP systems: A tutorial
    • Feb.
    • C. B. Sankaran, "Network access security in next generation 3GPP systems: A tutorial," IEEE Commun. Mag., vol. 47, no. 2, pp. 84-91, Feb. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.2 , pp. 84-91
    • Sankaran, C.B.1
  • 195
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis for opportunistic relaying
    • Jul.
    • Y. Zou, X. Wang, W. Shen, L. Hanzo, "Security versus reliability analysis for opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 196
    • 84927712570 scopus 로고    scopus 로고
    • Safeguarding 5G wireless communication networks using physical layer security
    • Apr.
    • N. Yang et al., "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 20-27
    • Yang, N.1
  • 197
    • 84896874339 scopus 로고    scopus 로고
    • Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results
    • Feb.
    • W. Roh et al., "Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results," IEEE Commun. Mag., vol. 52, no. 2, pp. 106-113, Feb. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.2 , pp. 106-113
    • Roh, W.1
  • 198
    • 84904979683 scopus 로고    scopus 로고
    • What will 5G be?
    • Jun.
    • J. Andrews et al., "What will 5G be?" IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065-1082, Jun. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.6 , pp. 1065-1082
    • Andrews, J.1
  • 199
    • 84896864948 scopus 로고    scopus 로고
    • Cellular architecture and key technologies for 5G wireless communication networks
    • Feb.
    • C.-X. Wang et al., "Cellular architecture and key technologies for 5G wireless communication networks," IEEE Commun. Mag., vol. 52, no. 2, pp. 122-130, Feb. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.2 , pp. 122-130
    • Wang, C.-X.1
  • 200
    • 84901286059 scopus 로고    scopus 로고
    • Cloud technologies for flexible 5G radio access networks
    • May
    • P. Rost et al., "Cloud technologies for flexible 5G radio access networks," IEEE Commun. Mag., vol. 52, no. 5, pp. 68-76, May 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.5 , pp. 68-76
    • Rost, P.1
  • 201
    • 84959568783 scopus 로고    scopus 로고
    • Securing physical-layer communications for cognitive radio networks
    • Sep.
    • Y. Zou, J. Zhu, L. Yang, Y.-C. Liang, Y.-D. Yao, "Securing physical-layer communications for cognitive radio networks," IEEE Commun. Mag., vol. 53, no. 9, pp. 48-54, Sep. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.9 , pp. 48-54
    • Zou, Y.1    Zhu, J.2    Yang, L.3    Liang, Y.-C.4    Yao, Y.-D.5
  • 202
    • 84983745651 scopus 로고    scopus 로고
    • Relay selection for wireless communications against eavesdropping: A security-reliability tradeoff perspective
    • Y. Zou, J. Zhu, X. Li, L. Hanzo, "Relay selection for wireless communications against eavesdropping: A security-reliability tradeoff perspective," IEEE Network.
    • IEEE Network
    • Zou, Y.1    Zhu, J.2    Li, X.3    Hanzo, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.