scholarly journals Fast and Secure Communication Resume Protocol for Wireless Networks

Author(s):  
Kihong Kim ◽  
Jinkeun Hong ◽  
Jongin Lim
2016 ◽  
Vol 114 (1) ◽  
pp. 19-26 ◽  
Author(s):  
H. Vincent Poor ◽  
Rafael F. Schaefer

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.


Technological advancement in the design of wireless communication have propelled an active interest in the field of Wireless Networks, Wireless Sensor Networks (WSNs), and Mobile Adhoc Networks (MANETs). Now days the speed and privacy are more reason of concern than the performance. The attacks can occur and there is always a chance that it will be a success. One of the major problems with Wireless Network security is that, all types of attacks are not known, and new ones emerge constantly [6]. Moreover, there is also a range of attacks that can be launched in the different mode, and thus making it more difficult for the Intrusion Detection System (IDS) to detect them. Therefore, main approach in network security is to detect and remove malicious intrusions. In this paper three different techniques have been proposed for securing Wireless LAN, WSNs and MANETs.


2020 ◽  
Vol 10 (2) ◽  
pp. 9-17
Author(s):  
Tuan Nhu Nguyen

Abstract— To secure communication from the sender to the receiver in wireless networks, cryptographic algorithms are usually used to encrypt data at the upper layers of a multi-tiered transmission model. Another emerging trend in the security of data transmitted over wireless networks is the physical layer security based on beamforming and interference fading  communication technology and not using cryptographic algorithms. This trend has attracted increasing concerns from both academia and industry. This paper addresses how physical layer security can protect secret data compare with the traditional cryptographic encryption and which is the better cooperative relaying scheme with the state of the art approached methods in wireless relaying beamforming network.Tóm tắt— Việc bảo mật truyền thông vô tuyến từ nơi gửi đến nơi nhận thường sử dụng các thuật toán mật mã để mã hoá dữ liệu tại các tầng phía trên trong mô hình phân lớp. Một xu hướng khác đang được quan tâm rộng rãi là bảo mật tầng vật lý dựa trên kỹ thuật truyền tin beamforming và kỹ thuật tương tác fading kênh chủ động. Xu hướng này hiện đang được thu hút cả trong giới công nghiệp và nghiên cứu. Đóng góp của bài báo này là làm rõ khả năng bảo mật tầng vật lý và so sách chúng với phương pháp bảo mật dùng kỹ thuật mật mã truyền thống. Bài báo cũng so sánh hai kỹ thuật chuyển tiếp được sử dụng chính trong bảo mật tầng vật lý cho mạng vô tuyến chuyển tiếp là Amplify-and-Forward và Decode-and-Forward.


Sign in / Sign up

Export Citation Format

Share Document