Open Access   Article Go Back

Study On Physical Layer Wireless Security Techniques

S. Lemya1 , V.M. Meera2 , A. Thrupthi3

Section:Survey Paper, Product Type: Journal Paper
Volume-4 , Issue-11 , Page no. 53-56, Nov-2016

Online published on Nov 29, 2016

Copyright © S. Lemya, V.M. Meera, A. Thrupthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Lemya, V.M. Meera, A. Thrupthi, “Study On Physical Layer Wireless Security Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.53-56, 2016.

MLA Style Citation: S. Lemya, V.M. Meera, A. Thrupthi "Study On Physical Layer Wireless Security Techniques." International Journal of Computer Sciences and Engineering 4.11 (2016): 53-56.

APA Style Citation: S. Lemya, V.M. Meera, A. Thrupthi, (2016). Study On Physical Layer Wireless Security Techniques. International Journal of Computer Sciences and Engineering, 4(11), 53-56.

BibTex Style Citation:
@article{Lemya_2016,
author = { S. Lemya, V.M. Meera, A. Thrupthi},
title = {Study On Physical Layer Wireless Security Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2016},
volume = {4},
Issue = {11},
month = {11},
year = {2016},
issn = {2347-2693},
pages = {53-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1106},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1106
TI - Study On Physical Layer Wireless Security Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - S. Lemya, V.M. Meera, A. Thrupthi
PY - 2016
DA - 2016/11/29
PB - IJCSE, Indore, INDIA
SP - 53-56
IS - 11
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1501 1416 downloads 1348 downloads
  
  
           

Abstract

Communication security is an essential and progressively difficult issue in wireless networks. Physical-layer approach to secret key generation which is each quick and independent of channel variations is taken into account. This approach makes a receiver jam the signal during a manner that also permits it to decrypt the info, nevertheless prevents alternative nodes from cryptography. Another well-known approach for achieving information-theoretic secrecy depends on deploying artificial noises to blind the intruders� interception within the physical layer. A multiple inter-symbol obfuscation (MIO) theme is planned, that utilizes a collection of artificial vociferous symbols to alter the initial knowledge symbols within the physical layer. MIO will effectively enhance the wireless communications security.

Key-Words / Index Term

Wireless communications security, physical layer security, information-theoretic secrecy, artificial noise

References

. Gollakota and D. Katabi, �Physical layer wireless security made fast and channel independent,� in Proc. IEEE INFOCOM, Apr. 2011, pp. 1125�1133.
[2] Tao Xiong, Wei Lou, Jin Zhang, Hailun Tan, MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation, IEEE, VOL. 10,NO. 8, pp.1678-1691, 2015.
[3] M. I. Husain, S. Mahant, and R. Sridhar, �CD-PHY: Physical layer security in wireless networks through constellation diversity,� in Proc. IEEE MILCOM, Oct./Nov. 2012, pp. 1�9.
[4] Block Cipher Encryption Process, www.nist.gov/bcencrypt, Mar 12, 2015.
[5] Charalampos N. Pitas, Christos E. Tsirakis, �Emerging communication technologies and security challenges in a smart grid wireless ecosystem�, Int. Journal of Wireless and Mobile Computing,Vol. 7, No.3 pp. 231 � 245, 2014.