A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

@article{Zou2016ASO,
  title={A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends},
  author={Yulong Zou and Xianbin Wang and Lajos Hanzo},
  journal={Proceedings of the IEEE},
  year={2016},
  volume={104},
  pages={1727-1765}
}
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

Transmit Optimization for Symbol-Level Spoofing

  • IEEE Transactions on Wireless Communications
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Artificial Noise Assisted Secure Interference Networks With Wireless Power Transfer

  • IEEE Transactions on Vehicular Technology
  • 2017
VIEW 2 EXCERPTS
CITES BACKGROUND

Beneficial jamming design for interference alignment networks

  • 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Design of an OFDM Physical Layer Encryption Scheme

  • IEEE Transactions on Vehicular Technology
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Internal Collusive Eavesdropping of Interference Alignment Networks

  • 2017 IEEE 85th Vehicular Technology Conference (VTC Spring)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

  • 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

A reliable covert channel over IEEE 802.15.4 using steganography

  • 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 192 REFERENCES

A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

  • 2009 2nd IEEE International Conference on Computer Science and Information Technology
  • 2009
VIEW 24 EXCERPTS
HIGHLY INFLUENTIAL

Keys Through ARQ: Theory and Practice

  • IEEE Transactions on Information Forensics and Security
  • 2011
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Physical layer wireless security made fast and channel independent

  • 2011 Proceedings IEEE INFOCOM
  • 2011
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Guaranteeing Secrecy using Artificial Noise

  • IEEE Transactions on Wireless Communications
  • 2008
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Bluetooth: Authentication, authorisation and encryption

P. Toengel
  • July 1999, available on-line at http://www.toengel.net/studium/mmand sec/bluetooth.pdf
  • 1999
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…