Physical-layer integrity for wireless messages
نویسندگان
چکیده
منابع مشابه
Physical-layer integrity for wireless messages
In this work, we discuss physical layer message manipulation attacks, in which an attacker changes physical-layer properties of an original wireless message. Instead of targeting the data content of the message, those attacks target message properties such as time-of-arrival, signal strength, angle-of-arrival, and others. As such attacks do not change the data content, they do not violate the m...
متن کاملWireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملPhysical layer model design for wireless networks
Physical Layer Model Design for Wireless Networks. (August 2006) Yi Yu, B.S., Southeast University; M.S., Southeast University Chair of Advisory Committee: Dr. Scott L. Miller Wireless network analysis and simulations rely on accurate physical layer models. The increased interest in wireless network design and cross-layer design require an accurate and efficient physical layer model especially ...
متن کاملPhysical-Layer Schemes for Wireless Coded Caching
We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme we consider employing coded caching on top of max-min fair multicasting, which is shown to be far from optimal at high SNR values. Our...
متن کاملPhysical-Layer-Enhanced Wireless Secret Key Exchange
We address the problem of efficiently establishing a shared secret key over an open wireless channel in the presence of an active (jamming) adversary. A commonly employed technique in practice for key sharing is the cryptographic ellipticcurve Diffie-Hellman (DH) protocol; however, its communication cost in a jammed environment is very high. Hence, we employ novel physical-layer techniques to e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2016
ISSN: 1389-1286
DOI: 10.1016/j.comnet.2016.06.021