Sciweavers

185 search results - page 2 / 37
» Techniques for Enhanced Physical-Layer Security
Sort
View
INFOCOM
2012
IEEE
11 years 7 months ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
ICC
2007
IEEE
143views Communications» more  ICC 2007»
13 years 11 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
TIFS
2008
145views more  TIFS 2008»
13 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
NETWORK
2008
106views more  NETWORK 2008»
13 years 4 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
VTC
2010
IEEE
157views Communications» more  VTC 2010»
13 years 3 months ago
Cross-Layer Solutions for Cooperative Medium Access Control Protocols
— Recent studies have shown that designing a Medium Access Control (MAC) protocol combined with a cooperative approach may improve the attainable network throughput, despite redu...
Alessandro Crismani, Fulvio Babich, Lajos Hanzo