A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

NB-IoT security: A survey

V Kumar, RK Jha, S Jain - Wireless Personal Communications, 2020 - Springer
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …

On Wireless Channels With -Antenna Eavesdroppers: Characterization of the Outage Probability and -Outage Secrecy Capacity

VU Prabhu, MRD Rodrigues - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In this correspondence, we characterize the probability of secrecy-outage and the
asymptotic high-signal-to-noise ratio (SNR) ε-outage secrecy-capacity for a single-input …

EMF-Constrained Artificial Noise for Secrecy Rates With Stochastic Eavesdropper Channels

S Roth, A Sezgin - IEEE Wireless Communications Letters, 2024 - ieeexplore.ieee.org
An information-theoretic confidential communication is achievable if the eavesdropper has a
degraded channel compared to the legitimate receiver. In wireless channels, beamforming …

Physical Layer Security over Tsallis Statistics for Wireless Communications with Hardware Impairments in the Presence of some Eavesdroppers

M Fatehi - International Journal of Theoretical Physics, 2023 - Springer
In this paper, considering Tsallis statistics, we investigate the problem of physical layer
security (PLS) in information theory. To do this, we choose q-exponential distribution to …

Downlink Secrecy Rate Maximization for IRS-Aided Cell-Free Massive MIMO Networks: Analysis and Deep Learning Design

TN Tran, B An - 2022 13th International Conference on …, 2022 - ieeexplore.ieee.org
In this paper, we study to maximize the downlink secrecy rate for IRS-Aided Cell-Free
Massive MIMO (CF-mMIMO) networks. Particularly, firstly, we derive the signal to …

[PDF][PDF] Wireless information-theoretic security in an outdoor topology with obstacles: Theoretical analysis and experimental measurements

T Chrysikos, T Dagiuklas, S Kotsopoulos - EURASIP Journal on Wireless …, 2011 - Springer
This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has
been recently introduced as a robust physical layer-based security solution, especially for …

Wep, Wap and Wap2 wireless network security protocol: A compact algorithm:(wireless network security protocol)

A Badholia, V Verma… - … Conference on Computing …, 2019 - ieeexplore.ieee.org
The modern communication lies with the Wireless Network Systems (WNS). This paper
studies the three popular WNS protocols ie WEP, WAP and WAP2. The improved version of …

Wireless information-theoretic security for moving users in autonomic networks

T Chrysikos, T Dagiuklas… - 2010 IFIP Wireless …, 2010 - ieeexplore.ieee.org
This paper studies Wireless Information-Theoretic Security for low-speed mobility in
autonomic networks. More specifically, the impact of user movement on the Probability of …

Refined model for calculation of limiting secret efficiency of Wi-Fi communication channel

VM Shokalo, AA Strelnitsky… - Telecommunications …, 2012 - dl.begellhouse.com
The urgent problem of investigations in the field of wire less technologies the search of new
ways for raising the communication channels security not only on the information button the …