The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The reciprocity of the wireless and the randomness of channel characteristic is the basis of physical layer key generation technology based on the channel. The complete key generation technologies include five steps that channel probing, channel feature extraction, quantification, reconciliation and privacy application. There are many theories and simulation prove the feasibility of key extraction...
Molecular communication in nanonetworks is an emerging communication paradigm that uses molecules as information carriers. Achieving a secure information exchange is one of the practical challenges that need to be considered to address the potential of molecular communications in nanonetworks. In this article, we have introduced secure channel into molecular communications to prevent eavesdropping...
In this work, we propose a full-duplex relay (FDR) network for secure communication in the presence of an eavesdropper. We consider both the destination and the amplify-and-forward relay has a full-duplex capability for a higher rate and/or a stronger secrecy performance. In particular, the destination transmits a cooperative jamming signal while receiving the relayed signal. To get analytic understanding,...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
Future automated vehicles will rely on V2V communication to exchange information about their motion states and take corresponding control actions, to enhance road safety and efficiency. Evaluating the trustworthiness of such data in a VANET is critical as malicious vehicles may inject false data which will undermine the benefits of V2V communication and lead to severe consequences, such as collisions...
With the spread of social networks and mobile applications (apps), the amount of sensitive information shared across Internet increased considerably. Although the majority of this information is encrypted, many apps still transmit sensitive data in plain text, e.g., using HTTP (HyperText Transfer Protocol). Seemingly trivial information, if collected together, can leak out important data about a user...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
Security and privacy of mobile users is a theme of primary importance, given the widespread and growing use of connected smartphones, the great amount of personal data that can leak, and the lack of proper controlled environments in the current mobile scenario (for instance, mobile apps and their handling of permissions). In this paper we focus on a crucial part of this scenario: usage of mobile phone...
The potential of full-duplex in communication design has been recently considered for emerging technologies such as 5G. Moreover, full-duplex can play a crucial role in upcoming secure communication scenarios too. However, results in the literature are limited and only explore scenarios, where the wireless channel is used either for key generation or for secure messaging. Our first contribution is...
Wireless communication technologies such as WiFi, ZigBee, or Bluetooth often suffer from interference due to many devices using the same, unregulated frequency spectrum. Also, wireless coverage can be insufficient in certain areas of a building. At the same time, eavesdropping a wireless communication outside a building might be easy due to the extended communication range of particular technologies...
Technological advances in wearable and implanted medical devices are enabling wireless body area networks to alter the current landscape of medical and healthcare applications. These systems have the potential to significantly improve real time patient monitoring, provide accurate diagnosis and deliver faster treatment. In spite of their growth, securing the sensitive medical and patient data relayed...
The use of wireless technologies within factories demands a comprehensive understanding of the problems and potential solutions associated with the rigors of the manufacturing environment. A clearly defined problem space would significantly ease the selection and deployment of appropriate wireless solutions to connected factory systems. A mapping of potential technologies to classes of use cases within...
Nowadays, more and more Internet-of-Things (IoT) smart products, interconnected through various wireless communication technologies (Wifi, Bluetooth, Zigbee, Z-wave, etc.) are integrated in daily life, especially in homes, factories, cities, etc. Such IoT technologies have become very attractive with a large variety of new services offered to improve the quality of life of the endusers or to create...
This paper studies the secrecy capacity scaling in an Amplify-and-Forward (AF) dual-phase large network containing K relays. In our model, part of these K relays are assumed to be potential eavesdroppers. Before transmitting the message in the first phase, the multi-antennas source divides it to partial messages and multicasts each part to a different disjoint sector. During the second phase, the...
Recently, UAV (Unmanned Aerial Vehicle) related technologies have significantly developed and its prospective applications include precision agriculture, disaster relief operation, flying crowd surveillance, flying intelligent transportation service, and flying information gathering and dissemination. To operate those promising UAVs in each country's general airspace, we need a reliable and secure...
Medical devices equipped with wireless connectivity and remote monitoring features are increasingly becoming connected to each other, to an outside programmer and even to the Internet. While Internet of Things technology enables health-care professionals to fine tune or modify medical device settings without invasive procedures, this also opens up large attack surfaces and introduces potential security...
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can...
Duplication transforms into a basic thought when spatiotemporal and secure communication required. In the wired network packet may be lost due to congestion but in wireless network packet may be loosed because of many things like- one is congestion and other is link failure, node failure, radio frequency interference, power failure etc. These are called random errors. The Flow of duplicacy increases...
Cognitive heterogeneous cellular networks (CHCNs) and multi-user multiple-input multiple-output (MU-MIMO) are both promising technologies in the future network where wireless transmissions are inherently vulnerable to security breaches. Under an interference constraint set by the primary user, this study examines the impact of MU-MIMO technology on secure communication between cognitive base stations...
This paper investigates the secrecy performance of half-duplex relay networks. First, we establish a relay broadcasting wiretap channel model using a half-duplex relay with multiple antennas and derive the instantaneous secrecy capacity of this system. With convex optimization, the upper bound on the capacity region is provided. Second, we give the expression for the ergodic secrecy rate and analyze...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.