Study On Physical Layer Wireless Security Techniques
S. Lemya1 , V.M. Meera2 , A. Thrupthi3
Section:Survey Paper, Product Type: Journal Paper
Volume-4 ,
Issue-11 , Page no. 53-56, Nov-2016
Online published on Nov 29, 2016
Copyright © S. Lemya, V.M. Meera, A. Thrupthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Lemya, V.M. Meera, A. Thrupthi, “Study On Physical Layer Wireless Security Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.53-56, 2016.
MLA Style Citation: S. Lemya, V.M. Meera, A. Thrupthi "Study On Physical Layer Wireless Security Techniques." International Journal of Computer Sciences and Engineering 4.11 (2016): 53-56.
APA Style Citation: S. Lemya, V.M. Meera, A. Thrupthi, (2016). Study On Physical Layer Wireless Security Techniques. International Journal of Computer Sciences and Engineering, 4(11), 53-56.
BibTex Style Citation:
@article{Lemya_2016,
author = { S. Lemya, V.M. Meera, A. Thrupthi},
title = {Study On Physical Layer Wireless Security Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2016},
volume = {4},
Issue = {11},
month = {11},
year = {2016},
issn = {2347-2693},
pages = {53-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1106},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1106
TI - Study On Physical Layer Wireless Security Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - S. Lemya, V.M. Meera, A. Thrupthi
PY - 2016
DA - 2016/11/29
PB - IJCSE, Indore, INDIA
SP - 53-56
IS - 11
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1501 | 1416 downloads | 1348 downloads |
Abstract
Communication security is an essential and progressively difficult issue in wireless networks. Physical-layer approach to secret key generation which is each quick and independent of channel variations is taken into account. This approach makes a receiver jam the signal during a manner that also permits it to decrypt the info, nevertheless prevents alternative nodes from cryptography. Another well-known approach for achieving information-theoretic secrecy depends on deploying artificial noises to blind the intruders� interception within the physical layer. A multiple inter-symbol obfuscation (MIO) theme is planned, that utilizes a collection of artificial vociferous symbols to alter the initial knowledge symbols within the physical layer. MIO will effectively enhance the wireless communications security.
Key-Words / Index Term
Wireless communications security, physical layer security, information-theoretic secrecy, artificial noise
References
. Gollakota and D. Katabi, �Physical layer wireless security made fast and channel independent,� in Proc. IEEE INFOCOM, Apr. 2011, pp. 1125�1133.
[2] Tao Xiong, Wei Lou, Jin Zhang, Hailun Tan, MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation, IEEE, VOL. 10,NO. 8, pp.1678-1691, 2015.
[3] M. I. Husain, S. Mahant, and R. Sridhar, �CD-PHY: Physical layer security in wireless networks through constellation diversity,� in Proc. IEEE MILCOM, Oct./Nov. 2012, pp. 1�9.
[4] Block Cipher Encryption Process, www.nist.gov/bcencrypt, Mar 12, 2015.
[5] Charalampos N. Pitas, Christos E. Tsirakis, �Emerging communication technologies and security challenges in a smart grid wireless ecosystem�, Int. Journal of Wireless and Mobile Computing,Vol. 7, No.3 pp. 231 � 245, 2014.