A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

[PDF][PDF] MODELING AND ANALYSIS OF A WI-FI ACCESS METHOD WITH PRESENCE OF AN ACTIVE EAVESDROPPER

PM Quang, PTD Ngoc, TT Duy, VNQ Bao - researchgate.net
In this paper, we propose a radio access method in Wi-Fi networks with presence of an
active eavesdropper (EA). In the considered protocol, one user (US) selects one of available …

[PDF][PDF] This is a self-archived version of an original article. This version may differ from the original in pagination and typographic details.

F Jameel, S Wyne, G Kaddoum, TQ Duong, F Jameel… - 2018 - jyx.jyu.fi
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Of late, the research …