Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless Communications
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Securing Wireless Communications at the Physical Layer
Securing Wireless Communications at the Physical Layer
Using the physical layer for wireless authentication in time-variant channels
IEEE Transactions on Wireless Communications
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Journal of Computer and System Sciences
Hi-index | 0.00 |
While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this article we argue that new security paradigms which exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral, and temporal decorrelation properties of the radio channel, can enhance confidentiality and authentication services. We outline some basic constructions for these services, and then provide a case study for how such strategies can be integrated into a broader security framework for a wireless network.