-
1
-
-
84873709871
-
A survey of self organisation in future cellular networks
-
Feb.
-
O. Aliu, A. Imran, M. Imran, B. Evans, "A survey of self organisation in future cellular networks," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 336-361, Feb. 2013.
-
(2013)
IEEE Commun. Surv. Tut.
, vol.15
, Issue.1
, pp. 336-361
-
-
Aliu, O.1
Imran, A.2
Imran, M.3
Evans, B.4
-
2
-
-
84881315986
-
Stochastic geometry for modeling, analysis, design of multi-tier and cognitive cellular wireless networks: A survey
-
3rd Quart.
-
H. ElSawy, E. Hossain, M. Haenggi, "Stochastic geometry for modeling, analysis, design of multi-tier and cognitive cellular wireless networks: A survey," IEEE Commun. Surv. Tut., vol. 15, no. 3, pp. 996-1019, 3rd Quart. 2013.
-
(2013)
IEEE Commun. Surv. Tut.
, vol.15
, Issue.3
, pp. 996-1019
-
-
ElSawy, H.1
Hossain, E.2
Haenggi, M.3
-
3
-
-
84879362525
-
-
ITU Jan. [Online]. Available
-
ITU, "The World in 2013: ICT facts and figures," Jan. 2013. [Online]. Available: http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf
-
(2013)
The World in 2013: ICT Facts and Figures
-
-
-
4
-
-
84983771744
-
-
Symantec The 2012 Norton cybercrime report, Sep. [Online]. Available
-
Symantec Norton Department, "The 2012 Norton cybercrime report," Sep. 2012. [Online]. Available: http://www. norton.com/2012cybercrimereport
-
(2012)
Norton Department
-
-
-
5
-
-
70350320415
-
Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity
-
Sep.
-
M. M. Rashid, E. Hossain, V. K. Bhargava, "Cross-layer analysis of downlink V-BLAST MIMO transmission exploiting multiuser diversity," IEEE Trans. Wireless Commun., vol. 8, no. 9, pp. 4568-4579, Sep. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.9
, pp. 4568-4579
-
-
Rashid, M.M.1
Hossain, E.2
Bhargava, V.K.3
-
6
-
-
65249182443
-
Cross-layer design proposals for wireless mobile networks: A survey and taxonomy
-
Apr.
-
F. Foukalas, V. Gazis, N. Alonistioti, "Cross-layer design proposals for wireless mobile networks: A survey and taxonomy," IEEE Commun. Surv. Tut., vol. 10, no. 1, pp. 70-85, Apr. 2008.
-
(2008)
IEEE Commun. Surv. Tut.
, vol.10
, Issue.1
, pp. 70-85
-
-
Foukalas, F.1
Gazis, V.2
Alonistioti, N.3
-
7
-
-
23944514713
-
A survey, classification and comparative analysis of medium access control protocols for ad hoc networks
-
Apr.
-
R. Jurdak, C. Lopes, P. Baldi, "A survey, classification and comparative analysis of medium access control protocols for ad hoc networks," IEEE Commun. Surv. Tut., vol. 6, no. 1, pp. 2-16, Apr. 2004.
-
(2004)
IEEE Commun. Surv. Tut.
, vol.6
, Issue.1
, pp. 2-16
-
-
Jurdak, R.1
Lopes, C.2
Baldi, P.3
-
8
-
-
0035789266
-
Effects of wireless physical layer modeling in mobile ad hoc networks
-
Long Beach, CA, USA, Sep.
-
M. Takai, J. Martin, R. Bagrodia, "Effects of wireless physical layer modeling in mobile ad hoc networks," in Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Long Beach, CA, USA, Sep. 2001, pp. 87-94.
-
(2001)
Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 87-94
-
-
Takai, M.1
Martin, J.2
Bagrodia, R.3
-
9
-
-
72949115723
-
Physical layer impairment aware routing (PLIAR) in WDM optical networks: Issues and challenges
-
Dec.
-
C. Saradhi and S. Subramaniam, "Physical layer impairment aware routing (PLIAR) in WDM optical networks: Issues and challenges," IEEE Commun. Surv. Tut., vol. 11, no. 4, pp. 109-130, Dec. 2009.
-
(2009)
IEEE Commun. Surv. Tut.
, vol.11
, Issue.4
, pp. 109-130
-
-
Saradhi, C.1
Subramaniam, S.2
-
10
-
-
84873738656
-
Attacks and countermeasures on 802.16: Analysis and assessment
-
Feb.
-
C. Kolias, G. Kambourakis, S. Gritzalis, "Attacks and countermeasures on 802.16: Analysis and assessment," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 487-514, Feb. 2013.
-
(2013)
IEEE Commun. Surv. Tut.
, vol.15
, Issue.1
, pp. 487-514
-
-
Kolias, C.1
Kambourakis, G.2
Gritzalis, S.3
-
12
-
-
33745785091
-
-
Independence, KY, USA: Delmar Cengage Learning
-
M. Whitman and H. Mattord, Principles of Information Security, 4th ed. Independence, KY, USA: Delmar Cengage Learning, 2012.
-
(2012)
Principles of Information Security, 4th Ed
-
-
Whitman, M.1
Mattord, H.2
-
13
-
-
33751528815
-
MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
-
Y. Xiao, H.-H. Chen, B. Sun, R. Wang, S. Sethi, "MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks," EURASIP J. Wireless Commun. Netw., 2006, doi: 10.1155/WCN/2006/93830.
-
(2006)
EURASIP J. Wireless Commun. Netw.
-
-
Xiao, Y.1
Chen, H.-H.2
Sun, B.3
Wang, R.4
Sethi, S.5
-
14
-
-
0034228518
-
Securing electronic commerce: Reducing the SSL overhead
-
Jul.
-
G. Apostolopoulos, V. Peris, P. Pradhan, D. Saha, "Securing electronic commerce: Reducing the SSL overhead," IEEE Network, vol. 14, no. 4, pp. 8-16, Jul. 2000.
-
(2000)
IEEE Network
, vol.14
, Issue.4
, pp. 8-16
-
-
Apostolopoulos, G.1
Peris, V.2
Pradhan, P.3
Saha, D.4
-
15
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan, Jun.
-
K. Wong, Y. Zheng, J. Cao, S. Wang, "A dynamic user authentication scheme for wireless sensor networks," in Proc. IEEE Int. Conf. Sensor Netw. Ubiquitous Trustworthy Comput., Taichung, Taiwan, Jun. 2006, doi: 10.1109/SUTC.2006.1636182, pp. 244-251.
-
(2006)
Proc IEEE Int. Conf. Sensor Netw. Ubiquitous Trustworthy Comput.
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
16
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aug.
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Pers. Commun., vol. 1, no. 1, pp. 25-31, Aug. 2002.
-
(2002)
IEEE Pers. Commun.
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
17
-
-
39749131791
-
Authentication in wireless networks
-
Waikoloa, HI,USA, Jan.
-
G. Raju and R. Akbani, "Authentication in wireless networks," in Proc. 40th Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA, Jan. 2007, doi: 10.1109/HICSS.2007.93.
-
(2007)
Proc. 40th Annu.Hawaii Int. Conf. Syst. Sci.
-
-
Raju, G.1
Akbani, R.2
-
18
-
-
0034590150
-
A novel authentication scheme for ad hoc networks
-
Chicago, IL, USA, Sep.
-
L. Venkatraman and D. P. Agrawal, "A novel authentication scheme for ad hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., Chicago, IL, USA, Sep. 2000, pp. 1268-1273.
-
(2000)
Proc IEEE Wireless Commun. Netw. Conf.
, pp. 1268-1273
-
-
Venkatraman, L.1
Agrawal, D.P.2
-
19
-
-
70449623670
-
Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)
-
May
-
A. H. Lashkari, K. Lumpur, M. Mansoor, A. S. Danesh, "Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)," in Proc. Int. Conf. Signal Process. Syst., Singapore, May 2009.
-
(2009)
Proc. Int. Conf. Signal Process. Syst., Singapore
-
-
Lashkari, A.H.1
Lumpur, K.2
Mansoor, M.3
Danesh, A.S.4
-
20
-
-
22944481810
-
Securing Wi-Fi networks
-
Jul.
-
K. J. Hole, E. Dyrnes, P. Thorsheim, "Securing Wi-Fi networks," Computer, vol. 38, no. 7, pp. 28-34, Jul. 2005.
-
(2005)
Computer
, vol.38
, Issue.7
, pp. 28-34
-
-
Hole, K.J.1
Dyrnes, E.2
Thorsheim, P.3
-
24
-
-
51849084704
-
Securing wireless data networks against eavesdropping using smart antennas
-
Beijing, China, Jun.
-
S. Lakshmanan, C. Tsao, R. Sivakumar, K. Sundaresan, "Securing wireless data networks against eavesdropping using smart antennas," in Proc. 28th Int. Conf. Distrib. Comput. Syst., Beijing, China, Jun. 2008, pp. 19-27.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst.
, pp. 19-27
-
-
Lakshmanan, S.1
Tsao, C.2
Sivakumar, R.3
Sundaresan, K.4
-
25
-
-
38349154579
-
Denial-ofservice in wireless sensor networks: Attacks and defenses
-
Jan.
-
R. Raymond and S. Midkiff, "Denial-ofservice in wireless sensor networks: Attacks and defenses," IEEE Perv. Comput., vol. 7, no. 1, pp. 74-81, Jan. 2008.
-
(2008)
IEEE Perv. Comput.
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, R.1
Midkiff, S.2
-
26
-
-
36849079903
-
A survey of routing attacks in mobile ad hoc networks
-
Dec.
-
B. Kannhavong et al., "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Dec. 2007.
-
(2007)
IEEE Wireless Commun.
, vol.14
, Issue.5
, pp. 85-91
-
-
Kannhavong, B.1
-
27
-
-
11244304396
-
A man-in-themiddle attack on UMTS
-
Philadelphia, PA, USA, Oct.
-
U. Meyer and S. Wetzel, "A man-in-themiddle attack on UMTS," in Proc. 3rd ACM Workshop Wireless Security, Philadelphia, PA, USA, Oct. 2004, pp. 90-97.
-
(2004)
Proc. 3rd ACM Workshop Wireless Security
, pp. 90-97
-
-
Meyer, U.1
Wetzel, S.2
-
28
-
-
84868142391
-
A practical message falsification attack on WPA
-
Aug.
-
T. Ohigashi and M. Morii, "A practical message falsification attack on WPA," in Proc. Joint Workshop Inf. Security, Kaohsiung, Taiwan, Aug. 2009, pp. 1-12.
-
(2009)
Proc. Joint Workshop Inf. Security, Kaohsiung, Taiwan
, pp. 1-12
-
-
Ohigashi, T.1
Morii, M.2
-
30
-
-
4344674124
-
Quantum cryptography
-
Apr.
-
C. Elliott, "Quantum cryptography," IEEE Security Privacy, vol. 2, no. 4, pp. 57-61, Apr. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.4
, pp. 57-61
-
-
Elliott, C.1
-
31
-
-
84866898821
-
Cooperative secret key generation from phase estimation in narrowband fading channels
-
Sep.
-
Q. Wang, K. Xu, K. Ren, "Cooperative secret key generation from phase estimation in narrowband fading channels," IEEE J. Sel. Areas Commun., vol. 30, no. 9, pp. 1666-1674, Sep. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.9
, pp. 1666-1674
-
-
Wang, Q.1
Xu, K.2
Ren, K.3
-
32
-
-
79960864004
-
Adaptive wireless channel probing for shared key generation
-
Shanghai, China, Apr.
-
Y. Wei, K. Zengy, P. Mohapatra, "Adaptive wireless channel probing for shared key generation," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 2165-2173.
-
(2011)
Proc. 30th Annu IEEE Int. Conf. Comput. Commun.
, pp. 2165-2173
-
-
Wei, Y.1
Zengy, K.2
Mohapatra, P.3
-
33
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
34
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 7, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.7
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
35
-
-
84891356286
-
Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
-
Jun.
-
Y. Zou, X. Wang, W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE Int. Conf. Commun., Budapest, Hungary, Jun. 2013, pp. 2183-2187.
-
(2013)
Proc IEEE Int. Conf. Commun., Budapest, Hungary
, pp. 2183-2187
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
36
-
-
84884127556
-
Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior
-
Whistler, Canada, Jun.
-
Y. Zou, X. Wang, W. Shen, "Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior," in Proc. 17th IEEE Int. Conf. Comput. Supported Cooperative Work in Design, Whistler, Canada, Jun. 2013, pp. 704-709.
-
(2013)
Proc. 17th IEEE Int. Conf. Comput. Supported Cooperative Work in Design
, pp. 704-709
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
37
-
-
84880855522
-
Analysis on the effects of artificial noise on physical layer security
-
Haspolat, Turkey, Apr.
-
O. Cepheli, T. Maslak, G. Kurt, "Analysis on the effects of artificial noise on physical layer security," in Proc. 21st Signal Process. Commun. Appl. Conf., Haspolat, Turkey, Apr. 2013, pp. 1-4.
-
(2013)
Proc. 21st Signal Process. Commun. Appl. Conf.
, pp. 1-4
-
-
Cepheli, O.1
Maslak, T.2
Kurt, G.3
-
38
-
-
84869193834
-
Artificial noise scheme to ensure secure communications in CWSN
-
Limassol, Cyprus, Aug.
-
A. Araujo, J. Blesa, E. Romero, O. Nieto-Taladriz, "Artificial noise scheme to ensure secure communications in CWSN," in Proc. 8th Int. Wireless Commun. Mobile Comput. Conf., Limassol, Cyprus, Aug. 2012, pp. 1023-1027.
-
(2012)
Proc. 8th Int. Wireless Commun. Mobile Comput. Conf.
, pp. 1023-1027
-
-
Araujo, A.1
Blesa, J.2
Romero, E.3
Nieto-Taladriz, O.4
-
39
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
40
-
-
84871988892
-
Multiuser transmit security beamforming in wireless multiple access channels
-
Ottawa, Canada, ON, Jun.
-
J. Wu and J. Chen, "Multiuser transmit security beamforming in wireless multiple access channels," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, ON, Jun. 2012, pp. 903-906.
-
(2012)
Proc IEEE Int. Conf. Commun.
, pp. 903-906
-
-
Wu, J.1
Chen, J.2
-
41
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H. Wang, Q. Yin, X. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.1
Yin, Q.2
Xia, X.3
-
42
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
43
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
44
-
-
77958084079
-
Security and privacy in emerging wireless networks
-
Oct.
-
D. Ma and G. Tsudik, "Security and privacy in emerging wireless networks," IEEE Wireless Commun., vol. 17, no. 5, pp. 12-21, Oct. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.5
, pp. 12-21
-
-
Ma, D.1
Tsudik, G.2
-
45
-
-
47149105095
-
Security threats in wireless sensor networks
-
Jun.
-
H. Kumar, D. Sarma, A. Kar, "Security threats in wireless sensor networks," IEEE Aerosp. Electron. Syst. Mag., vol. 23, no. 6, pp. 39-45, Jun. 2008.
-
(2008)
IEEE Aerosp. Electron. Syst. Mag.
, vol.23
, Issue.6
, pp. 39-45
-
-
Kumar, H.1
Sarm, A.D.2
Kar, A.3
-
46
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y. Shiu et al., "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.1
-
47
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Sep.
-
Y. Jiang, C. Lin, X. Shen, M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
48
-
-
2942634469
-
-
Englewood Cliffs, NJ, USA: Prentice-Hall, Jan.
-
W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd ed. Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.
-
(2010)
Cryptography and Network Security: Principles and Practices, 3rd Ed
-
-
Stalling, W.1
-
49
-
-
67650844989
-
Sensor network security: A survey
-
Apr.
-
X. Chen, K. Makki, K. Yen, N. Pissinou, "Sensor network security: A survey," IEEE Commun. Surv. Tut., vol. 11, no. 2, pp. 52-73, Apr. 2009.
-
(2009)
IEEE Commun. Surv. Tut.
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
50
-
-
21644440888
-
Security for industrial communications systems
-
Jun.
-
D. Dzung, M. Naedele, T. Von Hoff, M. Crevatin, "Security for industrial communications systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005.
-
(2005)
Proc IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.3
Crevatin, M.4
-
51
-
-
11144340927
-
Designing secure sensor networks
-
Dec.
-
E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Commun., vol. 11, no. 6, pp. 38-43, Dec. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
52
-
-
77951598972
-
CAT: Building couples to early detect node compromise attack in wireless sensor networks
-
Honolulu, HI, USA, Dec.
-
X. Lin, "CAT: Building couples to early detect node compromise attack in wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., Honolulu, HI, USA, Dec. 2009, pp. 1-6.
-
(2009)
Proc IEEE Global Telecommun. Conf.
, pp. 1-6
-
-
Lin, X.1
-
53
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
54
-
-
79960556813
-
On a new type of denial of service attack in wireless networks: The distributed jammer network
-
Jul.
-
H. Huang, N. Ahmed, P. Karthik, "On a new type of denial of service attack in wireless networks: The distributed jammer network," IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2316-2324, Jul. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.7
, pp. 2316-2324
-
-
Huang, H.1
Ahmed, N.2
Karthik, P.3
-
55
-
-
4143124348
-
CDMA physical layer built-in security enhancement
-
Orlando, FL, USA, Oct.
-
J. Ren and T. Li, "CDMA physical layer built-in security enhancement," in Proc. IEEE 58th Veh. Technol. Conf., Orlando, FL, USA, Oct. 2003, pp. 2157-2161.
-
(2003)
Proc IEEE 58th Veh. Technol. Conf.
, pp. 2157-2161
-
-
Ren, J.1
Li, T.2
-
56
-
-
44349090820
-
Defending wireless sensor networks from jamming attacks
-
Athens, Greece, Jan.
-
A. Mpitziopoulos, G. Pantziou, C. Konstantopoulos, "Defending wireless sensor networks from jamming attacks," in Proc. IEEE 18th Int. Symp. Pers. Indoor Mobile Radio Commun., Athens, Greece, Jan. 2013, pp. 1-5.
-
(2013)
Proc IEEE 18th Int. Symp. Pers. Indoor Mobile Radio Commun.
, pp. 1-5
-
-
Mpitziopoulos, A.1
Pantziou, G.2
Konstantopoulos, C.3
-
57
-
-
77957890222
-
On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
-
Oct.
-
K. Pelechrinis, C. Koufogiannakis, S. Krishnamurthy, "On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks," IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3258-3271, Oct. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.10
, pp. 3258-3271
-
-
Pelechrinis, K.1
Koufogiannakis, C.2
Krishnamurthy, S.3
-
59
-
-
79959372828
-
-
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11 IEEE 802.11 Working Group
-
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11 Working Group.2007.
-
(2007)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
61
-
-
77954208078
-
LTE-advanced: Next-generation wireless broadband technology
-
Jun.
-
A. Ghosh et al., "LTE-advanced: Next-generation wireless broadband technology," IEEE Wireless Commun., vol. 17, no. 3, pp. 10-22, Jun. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.3
, pp. 10-22
-
-
Ghosh, A.1
-
62
-
-
77954850800
-
Future internet services and applications
-
Apr.
-
B. Haibo, L. Sohraby, C. Wang, "Future internet services and applications," IEEE Network, vol. 24, no. 4, pp. 4-5, Apr. 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 4-5
-
-
Haibo, B.1
Sohraby, L.2
Wang, C.3
-
63
-
-
84985994259
-
Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows
-
Feb.
-
R. Bruno and M. Conti, "Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows," IEEE Trans. Mobile Comput., vol. 7, no. 2, pp. 171-186, Feb. 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.2
, pp. 171-186
-
-
Bruno, R.1
Conti, M.2
-
64
-
-
0035362758
-
Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA
-
Jun.
-
S. Lee, G. Ahn, A. Campbell, "Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA," IEEE Commun. Mag., vol. 39, no. 6, pp. 156-165, Jun. 2001.
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.6
, pp. 156-165
-
-
Lee, S.1
Ahn, G.2
Campbell, A.3
-
65
-
-
0035360862
-
Delayed Internet routing convergence
-
Aug.
-
C. Labovitz, A. Ahuja, F. Jahanian, "Delayed Internet routing convergence," IEEE/ACM Trans. Netw., vol. 9, no. 3, pp. 293-306, Aug. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.9
, Issue.3
, pp. 293-306
-
-
Labovitz, C.1
Ahuja, A.2
Jahanian, F.3
-
66
-
-
0036536488
-
Transmit diversity in 3G CDMA systems
-
Apr.
-
R. Derryberry et al., "Transmit diversity in 3G CDMA systems," IEEE Commun. Mag., vol. 40, no. 4, pp. 68-75, Apr. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.4
, pp. 68-75
-
-
Derryberry, R.1
-
67
-
-
84863145458
-
LTE-advanced modem design: Challenges and perspectives
-
Feb.
-
D. Bai et al., "LTE-advanced modem design: Challenges and perspectives," IEEE Commun. Mag., vol. 50, no. 2, pp. 178-186, Feb. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.2
, pp. 178-186
-
-
Bai, D.1
-
68
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Apr.
-
S. M. Bellovin, "Security problems in the TCP/IP protocol suite," ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, Apr. 1989.
-
(1989)
ACM SIGCOMM Comput. Commun. Rev.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
69
-
-
77952645732
-
Identification of effective network features to detect Smurf attacks
-
Serdang, Malaysia, Nov.
-
G. Zargar and P. Kabiri, "Identification of effective network features to detect Smurf attacks," in Proc. IEEE Student Conf. on Res. Develop., Serdang, Malaysia, Nov. 2009, pp. 49-52.
-
(2009)
Proc IEEE Student Conf. on Res. Develop.
, pp. 49-52
-
-
Zargar, G.1
Kabiri, P.2
-
70
-
-
38049024684
-
An analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Berlin, Germany: Springer-Verlag
-
T. Shon and W. Choi, "An analysis of mobile WiMAX security: Vulnerabilities and solutions," in Network-Based Information Systems Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2007, vol. 4658, pp. 88-97.
-
(2007)
Network-Based Information Systems Lecture Notes in Computer Science
, vol.4658
, pp. 88-97
-
-
Shon, T.1
Choi, W.2
-
71
-
-
4243082091
-
Security in wireless sensor networks
-
Jun.
-
A. Perrig, J. Stankovic, D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, Jun. 2004.
-
(2004)
Commun ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
72
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
Dec.
-
A. Mpitziopoulos, "A survey on jamming attacks and countermeasures in WSNs," IEEE Commun. Surv. Tut., vol. 11, no. 4, pp. 42-56, Dec. 2009.
-
(2009)
IEEE Commun. Surv. Tut.
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
-
73
-
-
77951260465
-
Using power hopping to counter MAC spoof attacks in WLAN
-
Las Vegas, NV, USA, Jan.
-
V. Nagarajan and D. Huang, "Using power hopping to counter MAC spoof attacks in WLAN," in Proc. IEEE Consumer Commun. Netw. Conf., Las Vegas, NV, USA, Jan. 2010, pp. 1-5.
-
(2010)
Proc IEEE Consumer Commun. Netw. Conf.
, pp. 1-5
-
-
Nagarajan, V.1
Huang, D.2
-
74
-
-
34250307702
-
A novel classification scheme for 802.11 WLAN active attacking traffic patterns
-
Las Vegas, NV, USA, Apr.
-
W. Zhou, A. Marshall, Q. Gu, "A novel classification scheme for 802.11 WLAN active attacking traffic patterns," in Proc. IEEE Wireless Commun. Netw. Conf., Las Vegas, NV, USA, Apr. 2006, pp. 623-628.
-
(2006)
Proc IEEE Wireless Commun. Netw. Conf.
, pp. 623-628
-
-
Zhou, W.1
Marshall, A.2
Gu, Q.3
-
75
-
-
36348985651
-
Securing Ad Hoc wireless networks against data injection attacks using firewalls
-
Hongkong, China, Apr.
-
J. Park and S. Kasera, "Securing Ad Hoc wireless networks against data injection attacks using firewalls," in Proc. IEEE Wireless Commun. Netw. Conf., Hongkong, China, Apr. 2007, pp. 2843-2848.
-
(2007)
Proc IEEE Wireless Commun. Netw. Conf.
, pp. 2843-2848
-
-
Park, J.1
Kasera, S.2
-
76
-
-
0003544796
-
-
Computer Emergency Response Team (CERT) Jan. [Online] Available
-
Computer Emergency Response Team (CERT), "CERT Advisory: IP Spoofing Attacks and Hijacked Terminal Connections," Jan. 1995. [Online]. Available: http://www.cert.org/advisories/CA-1995-01.html
-
(1995)
CERT Advisory: IP Spoofing Attacks and Hijacked Terminal Connections
-
-
-
77
-
-
0029721416
-
TCP/IP spoofing fundamentals
-
Phoenix, AZ, USA, Mar.
-
N. Hastings and P. McLean, "TCP/IP spoofing fundamentals," in Proc. IEEE 15th Annu. Int. Conf. Comput. Commun., Phoenix, AZ, USA, Mar. 1996, pp. 218-224.
-
(1996)
Proc IEEE 15th Annu. Int. Conf. Comput. Commun.
, pp. 218-224
-
-
Hastings, N.1
McLean, P.2
-
78
-
-
0032645074
-
TCP/IP security threats and attack methods
-
Jun.
-
B. Harrisa and R. Hunt, "TCP/IP security threats and attack methods," Comput. Commun., vol. 22, no. 10, pp. 885-897, Jun. 1999.
-
(1999)
Comput. Commun.
, vol.22
, Issue.10
, pp. 885-897
-
-
Harrisa, B.1
Hunt, R.2
-
79
-
-
33847663819
-
Active router approach to defeating denial-of-service attacks in networks
-
Feb.
-
F. El-Moussa, N. Linge, M. Hope, "Active router approach to defeating denial-of-service attacks in networks," IET Commun., vol. 1, no. 1, pp. 55-63, Feb. 2007.
-
(2007)
IET Commun.
, vol.1
, Issue.1
, pp. 55-63
-
-
El-Moussa, F.1
Linge, N.2
Hope, M.3
-
80
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Oakland, USA, May
-
C. Schuba et al., "Analysis of a denial of service attack on TCP," in Proc. IEEE Symp. Security Privacy, Oakland, USA, May 1997, pp. 208-223.
-
(1997)
Proc IEEE Symp. Security Privacy
, pp. 208-223
-
-
Schuba, C.1
-
81
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
Aug.
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies," IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683-696, Aug. 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
82
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct.
-
R. Chang, "Defending against flooding-based distributed denial-of-service attacks: A tutorial," IEEE Commun. Mag., vol. 40, no. 10, pp. 42-51, Oct. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.1
-
83
-
-
85089748801
-
-
RFC 2577 May [Online] Available
-
RFC 2577, "FTP security considerations," May 1999. [Online]. Available: http://tools. ietf.org/html/rfc2577
-
(1999)
FTP Security Considerations
-
-
-
84
-
-
0032023572
-
E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity
-
Mar.
-
T. Bass, A. Freyre, D. Gruber, G. Watt, "E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity," IEEE Network, vol. 12, no. 2, pp. 10-17, Mar. 1998.
-
(1998)
IEEE Network
, vol.12
, Issue.2
, pp. 10-17
-
-
Bass, T.1
Freyre, A.2
Gruber, D.3
Watt, G.4
-
85
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Vancouver, Canada BC, May
-
A. Kieyzun, P. Guo, K. Jayaraman, M. Ernst, "Automatic creation of SQL injection and cross-site scripting attacks," in Proc. IEEE 31st Int. Conf. Softw. Eng., Vancouver, Canada BC, May 2009, pp. 199-209.
-
(2009)
Proc IEEE 31st Int. Conf. Softw. Eng.
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.2
Jayaraman, K.3
Ernst, M.4
-
86
-
-
85008048349
-
IEEE 802.22: The first cognitive radio wireless regional area network standard
-
Jan.
-
C. Stevenson et al., "IEEE 802.22: The first cognitive radio wireless regional area network standard," IEEE Commun. Mag., vol. 47, no. 1, pp. 130-138, Jan. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.1
, pp. 130-138
-
-
Stevenson, C.1
-
87
-
-
16244399493
-
Bluetooth and Wi-Fi wireless protocols: A survey and a comparison
-
Feb.
-
E. Ferro and F. Potorti, "Bluetooth and Wi-Fi wireless protocols: A survey and a comparison," IEEE Wireless Commun., vol. 12, no. 1, pp. 12-26, Feb. 2005.
-
(2005)
IEEE Wireless Commun.
, vol.12
, Issue.1
, pp. 12-26
-
-
Ferro, E.1
Potorti, F.2
-
88
-
-
84873712223
-
A Survey on security for mobile devices
-
Mar.
-
M. Polla, F. Martinelli, D. Sgandurra, "A Survey on security for mobile devices," IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 446-471, Mar. 2013.
-
(2013)
IEEE Commun. Surv. Tut.
, vol.15
, Issue.1
, pp. 446-471
-
-
Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
89
-
-
84879880382
-
The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX
-
Oct.
-
D. Pareit, I. Moerman, P. Demeester, "The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX," IEEE Commun. Surv. Tut., vol. 14, no. 4, pp. 1183-1211, Oct. 2012.
-
(2012)
IEEE Commun. Surv. Tut.
, vol.14
, Issue.4
, pp. 1183-1211
-
-
Pareit, D.1
Moerman, I.2
Demeester, P.3
-
90
-
-
84905923583
-
A survey on security aspects for LTE and LTE-A networks
-
Apr.
-
J. Cao, H. Ma, H. Li, Y. Zhang, "A survey on security aspects for LTE and LTE-A networks," IEEE Commun. Surv. Tut., vol. 15, no. 2, Apr. 2013.
-
(2013)
IEEE Commun. Surv. Tut.
, vol.15
, Issue.2
-
-
Cao, J.1
Ma, H.2
Li, H.3
Zhang, Y.4
-
91
-
-
0009402121
-
-
Jul. [Online] Available
-
T. Muller, "Bluetooth Security Architecture," Jul. 1999. [Online]. Available: http://www.afn.org/afn48922/downs/wireless/1c11600.pdf
-
(1999)
Bluetooth Security Architecture
-
-
Muller, T.1
-
92
-
-
77956003252
-
Research of Bluetooth security manager
-
China, Dec.
-
M. Kui and X. Cuo, "Research of Bluetooth security manager," in Proc. IEEE Int. Conf. Neural Netw. Signal Process., Nanjing, China, Dec. 2003, pp. 1681-1684.
-
(2003)
Proc IEEE Int. Conf. Neural Netw. Signal Process., Nanjing
, pp. 1681-1684
-
-
Kui, M.1
Cuo, X.2
-
94
-
-
70449123717
-
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
-
Beijing, China, Aug.
-
A. Lashkari, M. Danesh, B. Samadi, "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)," in Proc. 2nd IEEE Int. Conf. Comput. Sci. Inf. Technol., Beijing, China, Aug. 2009, pp. 48-52.
-
(2009)
Proc. 2nd IEEE Int. Conf. Comput. Sci. Inf. Technol.
, pp. 48-52
-
-
Lashkari, A.1
Danesh, M.2
Samadi, B.3
-
95
-
-
70449623670
-
Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)
-
Singapore, May
-
A. Lashkari, M. Mansoor, A. Danesh, "Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)," in Proc. Int. Conf. Signal Process. Syst., Singapore, May 2009, pp. 445-449.
-
(2009)
Proc. Int. Conf. Signal Process. Syst.
, pp. 445-449
-
-
Lashkari, A.1
Mansoor, M.2
Danesh, A.3
-
96
-
-
43749124190
-
Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP
-
Xiamen, China, Nov.
-
J. Lee and C. Fan, "Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP," in Proc. Int. Symp. Intell. Signal Process. Commun. Syst., Xiamen, China, Nov. 2007, pp. 56-59.
-
(2007)
Proc. Int. Symp. Intell. Signal Process. Commun. Syst.
, pp. 56-59
-
-
Lee, J.1
Fan, C.2
-
97
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
-
May
-
A. Stubbleleld, J. Ioannidis, A. D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," ACM Trans. Inf. Syst. Security, vol. 7, no. 2, pp. 319-332, May 2004.
-
(2004)
ACM. Trans. Inf. Syst. Security
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubbleleld, A.1
Ioannidis, J.2
Rubin, A.D.3
-
98
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
Berlin, Germany: Springer-Verlag
-
E. Tews, R.-P. Weinmann, A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds," in Information Security Applications. Lecture Notes in Computer Science, Berlin, Germany: Springer-Verlag, 2007, vol. 4867, pp. 188-202.
-
(2007)
Information Security Applications. Lecture Notes in Computer Science
, vol.4867
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
-
99
-
-
33750959589
-
Secure enhanced wireless transfer protocol
-
Vienna, Austria, Apr.
-
J. Lin, Y. Kao, C. Yang, "Secure enhanced wireless transfer protocol," in Proc. 1st Int. Conf. Availab. Reliab. Security, Vienna, Austria, Apr. 2006, pp. 536-543.
-
(2006)
Proc. 1st Int. Conf. Availab. Reliab. Security
, pp. 536-543
-
-
Lin, J.1
Kao, Y.2
Yang, C.3
-
100
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
May
-
C. Nancy, H. Russ, W. David, W. Jesse, "Security flaws in 802.11 data link protocols," Commun. ACM, vol. 46, no. 5, pp. 35-39, May 2003.
-
(2003)
Commun ACM
, vol.46
, Issue.5
, pp. 35-39
-
-
Nancy, C.1
Russ, H.2
David, W.3
Jesse, W.4
-
101
-
-
70349147400
-
Practical attacks against WEP and WPA
-
Zurich, Switzerland, Mar.
-
E. Tews and M. Beck, "Practical attacks against WEP and WPA," in Proc. 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, Mar. 2009, pp. 79-86.
-
(2009)
Proc. 2nd ACM Conf. Wireless Netw. Security
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
-
102
-
-
67651085197
-
Advancement of MIMO technology in WiMAX: From IEEE 802.16d/e/j to 802.16m
-
Jun.
-
Q. Li, X. Lin, J. Zhang, W. Roh, "Advancement of MIMO technology in WiMAX: From IEEE 802.16d/e/j to 802.16m," IEEE Commun. Mag., vol. 47, no. 6, pp. 100-107, Jun. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.6
, pp. 100-107
-
-
Li, Q.1
Lin, X.2
Zhang, J.3
Roh, W.4
-
103
-
-
67650679649
-
Analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Atlanta, GA, USA, Sep.
-
T. Han et al., "Analysis of mobile WiMAX security: Vulnerabilities and solutions," in Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., Atlanta, GA, USA, Sep. 2008, pp. 828-833.
-
(2008)
Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst.
, pp. 828-833
-
-
Han, T.1
-
104
-
-
80054910459
-
Comparative analysis on TEK exchange between PKMv1 and PKMV2 for WiMAX
-
Wuhan, China, Sep.
-
F. Yang, "Comparative analysis on TEK exchange between PKMv1 and PKMV2 for WiMAX," in Proc. 7th Int. Conf. Wireless Commun. Netw. Mobile Comput., Wuhan, China, Sep. 2011, pp. 1-4.
-
(2011)
Proc. 7th Int. Conf. Wireless Commun. Netw. Mobile Comput.
, pp. 1-4
-
-
Yang, F.1
-
105
-
-
3042685819
-
Overview of IEEE 802.16 security
-
Jun.
-
D. Johnston and J. Walker, "Overview of IEEE 802.16 security," IEEE Security Privacy, vol. 2, no. 3, pp. 40-48, Jun. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
106
-
-
34250839908
-
Authentication authorization and accounting (AAA) schemes in WiMAX
-
May
-
S. Adibi et al., "Authentication authorization and accounting (AAA) schemes in WiMAX," in Proc. IEEE Int. Conf. Electroinf. Technol.,May 2006, pp. 210-215.
-
(2006)
Proc IEEE Int. Conf. Electroinf. Technol.
, pp. 210-215
-
-
Adibi, S.1
-
107
-
-
84947914301
-
A fast new des implementation in software
-
Haifa, Israel, Jan.
-
E. Biham, "A fast new DES implementation in software," in Proc. 4th Int. Workshop Fast Softw. Encryption, Haifa, Israel, Jan. 1997, pp. 260-272.
-
(1997)
Proc. 4th Int. Workshop Fast Softw. Encryption
, pp. 260-272
-
-
Biham, E.1
-
108
-
-
84983735284
-
-
Security Boca Raton FL: CRC Press
-
S. Ahson and M. Ilyas, WiMAX Standards and Security, Boca Raton, FL: CRC Press, 2007.
-
(2007)
WiMAX Standards
-
-
Ahson, S.1
Ilyas, M.2
-
109
-
-
67349139858
-
LTE: The evolution of mobile broadband
-
Apr.
-
D. Astely et al., "LTE: The evolution of mobile broadband," IEEE Commun. Mag., vol. 47, no. 4, pp. 44-51, Apr. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.4
, pp. 44-51
-
-
Astely, D.1
-
111
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
Mar.
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
112
-
-
80052450183
-
Mutual entity authentication for LTE
-
Istanbul, Turkey, Jul.
-
G. M. Koien, "Mutual entity authentication for LTE," in Proc. 7th Int. Wireless Commun. Mobile Comput. Conf., Istanbul, Turkey, Jul. 2011, pp. 43-55.
-
(2011)
Proc. 7th Int. Wireless Commun. Mobile Comput. Conf.
, pp. 43-55
-
-
Koien, G.M.1
-
114
-
-
82055172108
-
On the sliding property of SNOW 3G and SNOW 2.0
-
Dec.
-
A. Kircanski and A. Youssef, "On the sliding property of SNOW 3G and SNOW 2.0," IET Inf. Security, vol. 5, no. 4, pp. 199-206, Dec. 2011.
-
(2011)
IET Inf. Security
, vol.5
, Issue.4
, pp. 199-206
-
-
Kircanski, A.1
Youssef, A.2
-
115
-
-
0031188901
-
Rayleigh fading channels in mobile digital communication systems-Part I: Characterization
-
Jul.
-
B. Sklar, "Rayleigh fading channels in mobile digital communication systems-Part I: Characterization," IEEE Commun. Mag., vol. 35, no. 7, pp. 90-100, Jul. 1997.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.7
, pp. 90-100
-
-
Sklar, B.1
-
116
-
-
0035273711
-
On the estimation of the K parameter for the rice fading distribution
-
Mar.
-
A. Abdi, C. Tepedelenlioglu, M. Kaveh, G. Giannakis, "On the estimation of the K parameter for the rice fading distribution," IEEE Commun. Lett., vol. 5, no. 3, pp. 92-94, Mar. 2001.
-
(2001)
IEEE Commun. Lett.
, vol.5
, Issue.3
, pp. 92-94
-
-
Abdi, A.1
Tepedelenlioglu, C.2
Kaveh, M.3
Giannakis, G.4
-
117
-
-
0032671513
-
On higher order statistics of the Nakagami-m distribution
-
May
-
M. D. Yacoub, J. E. V. Bautista, L. Guerra de Rezende Guedes, "On higher order statistics of the Nakagami-m distribution," IEEE Trans. Veh. Technol., vol. 48, no. 3, pp. 790-794, May 1999.
-
(1999)
IEEE Trans. Veh. Technol.
, vol.48
, Issue.3
, pp. 790-794
-
-
Yacoub, M.D.1
Bautista, J.E.V.2
De Guerra, G.R.L.3
-
118
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Atlantic City, NJ, USA
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. IEEE Military Commun. Conf., Atlantic City, NJ, USA, 2005, pp. 1501-1506.
-
(2005)
Proc IEEE Military Commun. Conf.
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
119
-
-
84890522850
-
Communications theory of secrecy systems
-
C. E. Shannon, "Communications theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
120
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Nice, France, Jun.
-
A. Khisti, G. Womell, A. Wiesel, Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2471-2475.
-
(2007)
Proc IEEE Int. Symp. Inf. Theory
, pp. 2471-2475
-
-
Khisti, A.1
Womell, G.2
Wiesel, A.3
Eldar, Y.4
-
121
-
-
77953802876
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
122
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
123
-
-
84885893675
-
A closed-form expression for outage secrecy capacity in wireless information-theoretic security
-
Sep.
-
T. Chrysikos, T. Dagiuklas, S. Kotsopoulos, "A closed-form expression for outage secrecy capacity in wireless information-theoretic security," in Proc. 1st Int. ICST Workshop Security Emerging Wireless Commun. Netw. Syst., Athens, Greece, Sep. 2009, pp. 3-12.
-
(2009)
Proc. 1st Int. ICST Workshop Security Emerging Wireless Commun. Netw. Syst., Athens, Greece
, pp. 3-12
-
-
Chrysikos, T.1
Dagiuklas, T.2
Kotsopoulos, S.3
-
124
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
125
-
-
84863410145
-
MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom
-
Houston, TX, USA, Dec.
-
X. He, A. Khisti, A. Yener, "MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom," in Proc. IEEE Global Telecommun. Conf., Houston, TX, USA, Dec. 2011, pp. 1-5.
-
(2011)
Proc IEEE Global Telecommun. Conf.
, pp. 1-5
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
126
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jul.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jul. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
127
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Aug.
-
X. Zhou and M. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Aug. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.2
-
128
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W. Liao, T. Chang, W. Ma, C. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.1
Chang, T.2
Ma, W.3
Chi, C.4
-
129
-
-
80051621580
-
A robust artificial noise aided transmit design for MISO secrecy
-
Prague, Czech Republic, May
-
Q. Li and W. Ma, "A robust artificial noise aided transmit design for MISO secrecy," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Prague, Czech Republic, May 2011, pp. 3436-3439.
-
(2011)
Proc IEEE Int. Conf. Acoust. Speech Signal Process.
, pp. 3436-3439
-
-
Li, Q.1
Ma, W.2
-
130
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Oct.
-
D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Oct. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
-
131
-
-
77955366092
-
Collaborative relay beamforming for secrecy
-
Cape Town, South Africa, May
-
J. Zhang and M. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-5.
-
(2010)
Proc IEEE Int. Conf. Commun.
, pp. 1-5
-
-
Zhang, J.1
Gursoy, M.2
-
132
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
133
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I. Kim, K. Dong, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.2
Dong, K.3
-
134
-
-
84861601547
-
Strobe: Actively securing wireless communications using zero-forcing beamforming
-
Orlando, FL, USA, Mar.
-
N. Anand, S.-J. Lee, E. W. Knightly, "Strobe: Actively securing wireless communications using zero-forcing beamforming," in Proc. 31st IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 720-728.
-
(2012)
Proc. 31st IEEE INFOCOM
, pp. 720-728
-
-
Anand, N.1
Lee, S.-J.2
Knightly, E.W.3
-
135
-
-
80052009529
-
Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications in Proc
-
Kyoto, Japan, Jun.
-
H. Qin et al., "Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications in Proc. IEEE Int. Conf. Commun. Workshops, Kyoto, Japan, Jun. 2011, pp. 1-5.
-
(2011)
IEEE Int. Conf. Commun. Workshops
, pp. 1-5
-
-
Qin, H.1
-
136
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
137
-
-
84921832973
-
Improving diversity for physical-layer security in wireless communications
-
Jan.
-
Y. Zou, J. Zhu, X. Wang, V. Leung, "Improving diversity for physical-layer security in wireless communications," IEEE Network, vol. 29, no. 1, pp. 42-48, Jan. 2015.
-
(2015)
IEEE Network
, vol.29
, Issue.1
, pp. 42-48
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Leung, V.4
-
138
-
-
0038363341
-
Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels
-
May
-
L. Zheng and D. Tse, "Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1073-1096, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1073-1096
-
-
Zheng, L.1
Tse, D.2
-
139
-
-
0032183752
-
A simple transmitter diversity scheme for wireless communications
-
Oct.
-
S. Alamouti, "A simple transmitter diversity scheme for wireless communications," IEEE J. Sel. Areas Commun., vol. 16, no. 8, pp. 1451-1458, Oct. 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.8
, pp. 1451-1458
-
-
Alamouti, S.1
-
140
-
-
84866292458
-
Orthogonal frequency division multiple access in WiMAX and LTE: A comparison
-
Sep.
-
S. Srikanth, P. A. Murugesa, X. Fernando, "Orthogonal frequency division multiple access in WiMAX and LTE: A comparison," IEEE Commun. Mag., vol. 50, no. 9, pp. 153-161, Sep. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.9
, pp. 153-161
-
-
Srikanth, S.1
Murugesa, P.A.2
Fernando, X.3
-
141
-
-
18844366437
-
Advanced analysis methods for 3G cellular networks
-
Jun.
-
J. Laiho, K. Raivio, P. Lehtimaki, K. Hatonen, O. Simula, "Advanced analysis methods for 3G cellular networks," IEEE Trans. Wireless Commun., vol. 4, no. 3, pp. 930-942, Jun. 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.3
, pp. 930-942
-
-
Laiho, J.1
Raivio, K.2
Lehtimaki, P.3
Hatonen, K.4
Simula, O.5
-
142
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
143
-
-
0345258506
-
User cooperation diversity-Part I: System description
-
Nov.
-
A. Sendonaris, E. Erkip, B. Aazhang, "User cooperation diversity-Part I: System description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
144
-
-
84858300925
-
Opportunistic distributed space-time coding for decode-and-forward cooperation systems
-
Apr.
-
Y. Zou, Y.-D. Yao, B. Zheng, "Opportunistic distributed space-time coding for decode-and-forward cooperation systems," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1766-1781, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1766-1781
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
145
-
-
84919667792
-
Secrecy outage and diversity analysis of cognitive radio systems
-
Nov.
-
Y. Zou, X. Li, Y.-C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2222-2236
-
-
Zou, Y.1
Li, X.2
Liang, Y.-C.3
-
146
-
-
80052337836
-
Secret key generation exploiting channel characteristics in wireless communications
-
Aug.
-
K. Ren, H. Su, Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, Aug. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.4
, pp. 6-12
-
-
Ren, K.1
Su, H.2
Wang, Q.3
-
147
-
-
0032118152
-
Robust channel estimation for OFDM systems with rapid dispersive fading channels
-
Aug.
-
Y. Li, L. J. Cimini, N. R. Sollenberger, "Robust channel estimation for OFDM systems with rapid dispersive fading channels," IEEE Trans. Commun., vol. 46, no. 7, pp. 902-915, Aug. 2002.
-
(2002)
IEEE Trans. Commun.
, vol.46
, Issue.7
, pp. 902-915
-
-
Li, Y.1
Cimini, L.J.2
Sollenberger, N.R.3
-
148
-
-
0036648042
-
Subspace-based blind and semi-blind channel estimation for OFDM systems
-
Jul.
-
B. Muquet, M. Courville, P. Duhamel, "Subspace-based blind and semi-blind channel estimation for OFDM systems," IEEE Trans. Signal Process., vol. 50, no. 7, pp. 1699-1712, Jul. 2002.
-
(2002)
IEEE Trans. Signal Process.
, vol.50
, Issue.7
, pp. 1699-1712
-
-
Muquet, B.1
Courville, M.2
Duhamel, P.3
-
149
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New Delhi, India, Mar.
-
M. Steiner, G. Tsudik, M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. 3rd ACM Conf. Comput. Commun. Security, New Delhi, India, Mar. 1996, pp. 31-37.
-
(1996)
Proc. 3rd ACM Conf. Comput. Commun. Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
150
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J. E. Hershey, A. A. Hassan, R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
151
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
Oct.
-
A. A. Hassan, W. E. Stark, J. E. Hershey, S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Process., vol. 6, no. 10, pp. 207-212, Oct. 1996.
-
(1996)
Digital Signal Process.
, vol.6
, Issue.10
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
152
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
San Francisco, CA, USA Sep.
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. 14th Annu. Int. Conf. Mobile Comput. Netw., San Francisco, CA, USA, Sep. 2008, pp. 128-139.
-
(2008)
Proc. 14th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
153
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Beijing, China, Sep.
-
S. Jana et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. 15th Annu. Int. Conf. Mobile Comput. Netw., Beijing, China, Sep. 2009, pp. 321-332.
-
(2009)
Proc. 15th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 321-332
-
-
Jana, S.1
-
154
-
-
79960857245
-
Physical layer wireless security made fast and channel independent
-
Shanghai, China, Apr.
-
S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 1125-1133.
-
(2011)
Proc. 30th Annu IEEE Int. Conf. Comput. Commun.
, pp. 1125-1133
-
-
Gollakota, S.1
Katabi, D.2
-
155
-
-
84861623350
-
Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
-
Orlando, FL, USA, Mar.
-
H. Liu, J. Yang, Y. Wang, Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in Proc. 31st Annu. IEEE Int. Conf. Comput. Commun., Orlando, FL, USA, Mar. 2012, pp. 927-935.
-
(2012)
Proc. 31st Annu IEEE Int. Conf. Comput. Commun.
, pp. 927-935
-
-
Liu, H.1
Yang, J.2
Wang, Y.3
Chen, Y.4
-
156
-
-
84880741440
-
Intelligent mechanisms for key generation from multipath wireless channels
-
New York, NY, USA, Apr.
-
Y. Shehadeh, O. Alfandi, K. Tout, D. Hogrefe, "Intelligent mechanisms for key generation from multipath wireless channels," in Proc. Wireless Telecommun. Symp., New York, NY, USA, Apr. 2011, pp. 1-6.
-
(2011)
Proc. Wireless Telecommun. Symp.
, pp. 1-6
-
-
Shehadeh, Y.1
Alfandi, O.2
Tout, K.3
Hogrefe, D.4
-
157
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Shanghai, China, Mar.
-
Q. Wang, H. Su, K. Ren, K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks," in Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, Mar. 2011, pp. 1422-1430.
-
(2011)
Proc. 30th Annu IEEE Int. Conf. Comput. Commun.
, pp. 1422-1430
-
-
Wang, Q.1
Su, H.2
Ren, K.3
Kim, K.4
-
158
-
-
70349883977
-
Key generation exploiting MIMO channel evolution: Algorithm and theoretical limits
-
Berlin, Germany. Mar.
-
J. W. Wallace, C. Chen, M. A. Jensen, "Key generation exploiting MIMO channel evolution: Algorithm and theoretical limits," in Proc. 3rd Eur. Conf. Antennas Propag., Berlin, Germany, Mar. 2009, pp. 1499-1503.
-
(2009)
Proc. 3rd Eur. Conf. Antennas Propag.
, pp. 1499-1503
-
-
Wallace, J.W.1
Chen, C.2
Jensen, M.A.3
-
159
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
San Diego, CA, USA, Mar.
-
K. Zeng, D. Wu, A. Chan, P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010.
-
(2010)
Proc. 29th Annu IEEE Int. Conf. Comput. Commun.
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
160
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying systems
-
Sep.
-
T. Shimizu, H. Iwai, H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
161
-
-
79957837002
-
On passive inference attacks against physical-layer key extraction
-
Salzburg,Austria, Apr.
-
M. Edman, A. Kiayias, B. Yener, "On passive inference attacks against physical-layer key extraction?" in Proc. 4th Eur.WorkshopSyst. Security,Salzburg,Austria, Apr. 2011, doi: 10.1145/1972551.1972559.
-
(2011)
Proc. 4th Eur.WorkshopSyst. Security
-
-
Edman, M.1
Kiayias, A.2
Yener, B.3
-
162
-
-
84865611232
-
A practical man-in-the-middle attack on signal-based key generation protocols
-
S. Eberz, M. Strohmeier, M. Wilhelm, I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," Comput. Security, pp. 235-252, 2012.
-
(2012)
Comput. Security
, pp. 235-252
-
-
Eberz, S.1
Strohmeier, M.2
Wilhelm, M.3
Martinovic, I.4
-
163
-
-
84879516937
-
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
-
Budapest, Hungary, Apr.
-
L. Shi et al., "ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks," in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw., Budapest, Hungary, Apr. 2013, pp. 155-166.
-
(2013)
Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw.
, pp. 155-166
-
-
Shi, L.1
-
164
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
May
-
K. Pelechrinis, M. Iliofotou, S. V. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surv. Tut., vol. 13, no. 2, pp. 245-257, May 2011.
-
(2011)
IEEE Commun. Surv. Tut.
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.V.3
-
165
-
-
33748061660
-
Jamming and sensing of encrypted wireless ad hoc networks
-
Florence Italy,May
-
T. X. Brown, J. E. James, A. Sethi, "Jamming and sensing of encrypted wireless ad hoc networks," in Proc. 7th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Florence Italy,May 2006, pp. 120-130.
-
(2006)
Proc. 7th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 120-130
-
-
Brown, T.X.1
James, J.E.2
Sethi, A.3
-
166
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Urbana-Champaign, IL, USA,May
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana-Champaign, IL, USA,May 2005, pp. 46-57.
-
(2005)
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
167
-
-
0021422462
-
Frequency hopping with multiple frequency-shift keying and hard decisions
-
May
-
D. J. Torrieri, "Frequency hopping with multiple frequency-shift keying and hard decisions," IEEE Trans. Commun., vol. 32, no. 5, pp. 574-582, May 1984.
-
(1984)
IEEE Trans. Commun.
, vol.32
, Issue.5
, pp. 574-582
-
-
Torrieri, D.J.1
-
168
-
-
34548307187
-
Using channel hopping to increase 802.11 resilience to jamming attacks
-
Anchorage, AK, USA, May
-
V. Navda, A. Bohra, S. Ganguly, D. Rubenstein, "Using channel hopping to increase 802.11 resilience to jamming attacks," in Proc. 26th Annu. IEEE Int. Conf. Comput. Commun., Anchorage, AK, USA, May 2007, pp. 2526-2530.
-
(2007)
Proc. 26th Annu IEEE Int. Conf. Comput. Commun.
, pp. 2526-2530
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
169
-
-
36949015142
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
Kyoto, Japan, Aug.
-
R. Gummadi, D. Wetheral, B. Greenstein, S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," in Proc. ACM SIGCOMM 2007, Kyoto, Japan, Aug. 2007, pp. 385-396.
-
(2007)
Proc. ACM SIGCOMM 2007
, pp. 385-396
-
-
Gummadi, R.1
Wetheral, D.2
Greenstein, B.3
Seshan, S.4
-
170
-
-
0036647867
-
Direction finding in the presence of an intermittent interference
-
Jul.
-
O. Besson, P. Stoica, Y. Kamiya, "Direction finding in the presence of an intermittent interference," IEEE Trans. Signal Process., vol. 50, no. 7, pp. 1554-1564, Jul. 2002.
-
(2002)
IEEE Trans. Signal Process.
, vol.50
, Issue.7
, pp. 1554-1564
-
-
Besson, O.1
Stoica, P.2
Kamiya, Y.3
-
171
-
-
84861602103
-
BitTrickle: Defending against broadband and high-power reactive jamming attacks
-
Orlando, FL, USA, Mar.
-
Y. Liu and P. Ning, "BitTrickle: Defending against broadband and high-power reactive jamming attacks," in Proc. 31st Annu. IEEE Int. Conf. Comput. Commun., Orlando, FL, USA, Mar. 2012, pp. 909-917.
-
(2012)
Proc. 31st Annu IEEE Int. Conf. Comput. Commun.
, pp. 909-917
-
-
Liu, Y.1
Ning, P.2
-
172
-
-
0031236830
-
A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system
-
Sep.
-
E. Lance and G. K. Kaleh, "A diversity scheme for a phase-coherent frequency-hopping spread-spectrum system," IEEE Trans. Commun., vol. 45, no. 9, pp. 1123-1129, Sep. 1997.
-
(1997)
IEEE Trans. Commun.
, vol.45
, Issue.9
, pp. 1123-1129
-
-
Lance, E.1
Kaleh, G.K.2
-
173
-
-
0035493270
-
Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication
-
Oct.
-
L. Freitag, M. Stojanovic, S. Singh, M. Johnson, "Analysis of channel effects on direct-sequence and frequency-hopped spread-spectrum acoustic communication," IEEE J. Ocean. Eng., vol. 26, no. 4, pp. 586-593, Oct. 2001.
-
(2001)
IEEE J. Ocean. Eng.
, vol.26
, Issue.4
, pp. 586-593
-
-
Freitag, L.1
Stojanovic, M.2
Singh, S.3
Johnson, M.4
-
174
-
-
84856967268
-
Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN
-
Baltimore, MD, USA, Nov.
-
J. Jeung, S. Jeong, J. Lim, "Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLAN," in Proc. Military Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 1231-1236.
-
(2011)
Proc. Military Commun. Conf.
, pp. 1231-1236
-
-
Jeung, J.1
Jeong, S.2
Lim, J.3
-
175
-
-
84891786182
-
An error-minimizing framework for localizing jammers in wireless networks
-
Feb.
-
Z. Liu, H. Liu, W. Xu, Y. Chen, "An error-minimizing framework for localizing jammers in wireless networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 508-517, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 508-517
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
176
-
-
0031237594
-
IEEE 802.11 wireless local area networks
-
Sep.
-
B. P. Crow, I. Widjaja, J. G. Kim, P. T. Sakai, "IEEE 802.11 wireless local area networks," IEEE Commun. Mag., vol. 35, no. 9, pp. 116-126, Sep. 1997.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.9
, pp. 116-126
-
-
Crow, B.P.1
Widjaja, I.2
Kim, J.G.3
Sakai, P.T.4
-
177
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Mar.
-
G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
178
-
-
34548295754
-
SPREAD: Foiling smart jammers using multi-layer agility
-
Anchorage, AK, USA, Mar.
-
X. Liu, G. Noubir, R. Sundaram, S. Tan, "SPREAD: Foiling smart jammers using multi-layer agility," in Proc. 26th Annu. IEEE Int. Conf. Comput. Commun., Anchorage, AK, USA, Mar. 2007, pp. 2536-2540.
-
(2007)
Proc. 26th Annu IEEE Int. Conf. Comput. Commun.
, pp. 2536-2540
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
179
-
-
80051755314
-
Keys through ARQ: Theory and practice
-
Sep.
-
Y. Abdallah, M. A. Latif, M. Youssef, A. Sultan, H. E. Gamal, "Keys through ARQ: Theory and practice," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 737-751, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, M.A.2
Youssef, M.3
Sultan, A.4
Gamal, H.E.5
-
180
-
-
56749098358
-
Identifying unique devices through wireless fingerprinting
-
Alexandria, VA, USA, Mar.
-
D. Loh, C. Cho, C. Tan, R. Lee, "Identifying unique devices through wireless fingerprinting," in Proc. 1st ACM Conf. Wireless Netw. Security, Alexandria, VA, USA, Mar. 2008, pp. 46-55.
-
(2008)
Proc. 1st ACM Conf. Wireless Netw. Security
, pp. 46-55
-
-
Loh, D.1
Cho, C.2
Tan, C.3
Lee, R.4
-
181
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
New York, NY, USA, Sep.
-
V. Brik, S. Banerjee, M. Gruteser, S. Oh, "Wireless device identification with radiometric signatures," in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., New York, NY, USA, Sep. 2008, pp. 116-127.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Comput. Netw.
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
182
-
-
84901454675
-
Physical layer authentication for mobile systems with time-varying carrier frequency offsets
-
May
-
W. Hou, X. Wang, J.-Y. Chouinard, A. Refaey, "Physical layer authentication for mobile systems with time-varying carrier frequency offsets," IEEE Trans. Commun., vol. 62, no. 5, pp. 1658-1667, May 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.5
, pp. 1658-1667
-
-
Hou, W.1
Wang, X.2
Chouinard, J.-Y.3
Refaey, A.4
-
183
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
Jul.
-
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
184
-
-
84861598237
-
Enhanced wireless channel authentication using time-synched link signature
-
Shanghai, China, Mar.
-
Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in Proc. IEEE Int. Conf. Comput. Commun., Shanghai, China, Mar. 2012, pp. 2636-2640.
-
(2012)
Proc IEEE Int. Conf. Comput. Commun.
, pp. 2636-2640
-
-
Liu, Y.1
Ning, P.2
-
185
-
-
84887106886
-
SecureArray: Improving WiFi security with fine-grained physical-layer information
-
Miami, FL, USA, Sep.
-
J. Xiong and K. Jamieson, "SecureArray: Improving WiFi security with fine-grained physical-layer information," in Proc. 19th ACM Int. Conf. Mobile Comput. Netw., Miami, FL, USA, Sep. 2013, pp. 441-452.
-
(2013)
Proc. 19th ACM Int. Conf. Mobile Comput. Netw.
, pp. 441-452
-
-
Xiong, J.1
Jamieson, K.2
-
186
-
-
84904439278
-
Physical layer challenge-response authentication in wireless networks with relay
-
Toronto, ON, Canada, Mar.
-
X. Du, D. Shan, K. Zeng, L. Huie, "Physical layer challenge-response authentication in wireless networks with relay," in Proc. IEEE Int. Conf. Comput. Commun., Toronto, ON, Canada, Mar. 2014, pp. 1276-1284.
-
(2014)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 1276-1284
-
-
Du, X.1
Shan, D.2
Zeng, K.3
Huie, L.4
-
187
-
-
39449137863
-
Physical-layer authentication
-
Mar.
-
P. Yu, J. Baras, B. Sadler, "Physical-layer authentication," IEEE Trans. Inf. Forens.Security, vol. 3, no. 1, pp. 38-51, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forens.Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.2
Sadler, B.3
-
188
-
-
80051769332
-
MIMO authentication via deliberate fingerprinting at the physical layer
-
Mar.
-
P. Yu and B. Sadler, "MIMO authentication via deliberate fingerprinting at the physical layer," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 606-615, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 606-615
-
-
Yu, P.1
Sadler, B.2
-
189
-
-
84933526458
-
Wireless physical layer authentication via fingerprint embedding
-
Jun.
-
P. Yu, G. Verma, B. Sadler, "Wireless physical layer authentication via fingerprint embedding," IEEE Commun. Mag., vol. 53, no. 6, pp. 48-53, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 48-53
-
-
Yu, P.1
Verm, A.G.2
Sadler, B.3
-
190
-
-
84944878354
-
-
Boca Raton, FL, USA: CRC Press
-
A. Menezes, P. Oorschot, S. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL, USA: CRC Press, 2001.
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
191
-
-
70449468047
-
ARQ-based secret key sharing
-
Dresden, Germany, Jun.
-
M. Latif, A. Sultan, H. Gamal, "ARQ-based secret key sharing," in Proc. IEEE Int. Conf. Commun., Dresden, Germany, Jun. 2009, pp. 1-6.
-
(2009)
Proc IEEE Int. Conf. Commun.
, pp. 1-6
-
-
Latif, M.1
Sultan, A.2
Gamal, H.3
-
192
-
-
77953313388
-
Secure wireless communication with dynamic secrets
-
San Diego, CA, USA, Mar.
-
S. Xiao, W. Gong, D. Towsley, "Secure wireless communication with dynamic secrets," in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1-9.
-
(2010)
Proc IEEE INFOCOM
, pp. 1-9
-
-
Xiao, S.1
Gong, W.2
Towsley, D.3
-
193
-
-
84879917851
-
ARQ-based symmetric key generation over correlated erasure channels
-
Jul.
-
Y. Khiabani and S. Wei, "ARQ-based symmetric key generation over correlated erasure channels," IEEE Trans. Inf. Forens. Security, vol. 8, no. 7, pp. 1152-1161, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forens. Security
, vol.8
, Issue.7
, pp. 1152-1161
-
-
Khiabani, Y.1
Wei, S.2
-
194
-
-
62149116869
-
Network access security in next generation 3GPP systems: A tutorial
-
Feb.
-
C. B. Sankaran, "Network access security in next generation 3GPP systems: A tutorial," IEEE Commun. Mag., vol. 47, no. 2, pp. 84-91, Feb. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.2
, pp. 84-91
-
-
Sankaran, C.B.1
-
195
-
-
84904614329
-
Security versus reliability analysis for opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, L. Hanzo, "Security versus reliability analysis for opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
196
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Apr.
-
N. Yang et al., "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
-
197
-
-
84896874339
-
Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results
-
Feb.
-
W. Roh et al., "Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results," IEEE Commun. Mag., vol. 52, no. 2, pp. 106-113, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 106-113
-
-
Roh, W.1
-
198
-
-
84904979683
-
What will 5G be?
-
Jun.
-
J. Andrews et al., "What will 5G be?" IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065-1082, Jun. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.6
, pp. 1065-1082
-
-
Andrews, J.1
-
199
-
-
84896864948
-
Cellular architecture and key technologies for 5G wireless communication networks
-
Feb.
-
C.-X. Wang et al., "Cellular architecture and key technologies for 5G wireless communication networks," IEEE Commun. Mag., vol. 52, no. 2, pp. 122-130, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 122-130
-
-
Wang, C.-X.1
-
200
-
-
84901286059
-
Cloud technologies for flexible 5G radio access networks
-
May
-
P. Rost et al., "Cloud technologies for flexible 5G radio access networks," IEEE Commun. Mag., vol. 52, no. 5, pp. 68-76, May 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.5
, pp. 68-76
-
-
Rost, P.1
-
201
-
-
84959568783
-
Securing physical-layer communications for cognitive radio networks
-
Sep.
-
Y. Zou, J. Zhu, L. Yang, Y.-C. Liang, Y.-D. Yao, "Securing physical-layer communications for cognitive radio networks," IEEE Commun. Mag., vol. 53, no. 9, pp. 48-54, Sep. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.9
, pp. 48-54
-
-
Zou, Y.1
Zhu, J.2
Yang, L.3
Liang, Y.-C.4
Yao, Y.-D.5
-
202
-
-
84983745651
-
Relay selection for wireless communications against eavesdropping: A security-reliability tradeoff perspective
-
Y. Zou, J. Zhu, X. Li, L. Hanzo, "Relay selection for wireless communications against eavesdropping: A security-reliability tradeoff perspective," IEEE Network.
-
IEEE Network
-
-
Zou, Y.1
Zhu, J.2
Li, X.3
Hanzo, L.4
|