Wireless physical layer security using encryption and channel pre-compensation
In this paper we propose a scheme that provides physical layer security by combining two techniques known as encryption and channel pre-compensation. Encryption transforms the original signal constellation into a higher order constellation based on the key sequence generated by AES in counter-mode....
| Main Authors: | Tahir, Mohammad, Jarot, Sigit Puspito Wigati, Siddiqi, Muhammad Umar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/3812/ http://irep.iium.edu.my/3812/1/2010_ICCAIE_-_Wireless_physical_layer_security_using_encryption_and_channel_pre-compensation.pdf |
Similar Items
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Analysis of p2p communication over various mobile platforms
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
Impulsive noise effects on DWT-OFDM versus FFT-OFDM
by: Abdullah, Khaizuran, et al.
Published: (2011)
by: Abdullah, Khaizuran, et al.
Published: (2011)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
Radio propagation measurement and channel modelling for wireless body area network
by: Wan Nordin, Mimi Aminah, et al.
Published: (2011)
by: Wan Nordin, Mimi Aminah, et al.
Published: (2011)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Adaptive load balancing algorithm for wireless distributed computing networks
by: Alfaqawi, Mohammed, et al.
Published: (2016)
by: Alfaqawi, Mohammed, et al.
Published: (2016)
Image Transmission Over Wireless Channel
by: Singh, Arwinder
Published: (2005)
by: Singh, Arwinder
Published: (2005)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
Wireless decode-and-forward relay channels: time allocation strategies for cooperation and optimum operation
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
by: Elsheikh, Elsheikh Mohamed Ahmed
Published: (2010)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Joint channel assignment and routing in multiradio multichannel wireless mesh networks: Design considerations and approaches
by: Zakaria, Omar M., et al.
Published: (2016)
by: Zakaria, Omar M., et al.
Published: (2016)
AWGN and rayleigh fading behavior of the wireless decode-and-forward relay channel with arbitrary time and power allocation
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
by: Zarol Fitri Khairol Fauz, Muhammad Zarol Fitri, et al.
Published: (2018)
Error Control Techniques For Video Transmission Over Wireless Channels
by: Chang, Yoong Choon
Published: (2008)
by: Chang, Yoong Choon
Published: (2008)
Dynamic channel selection for meshed wireless personal area network
by: Abdul Lateef, Ahmed
Published: (2015)
by: Abdul Lateef, Ahmed
Published: (2015)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Coalition formation for throughput enhancement in cognitive radio wireless networks
by: Tahir, Mohammad, et al.
Published: (2015)
by: Tahir, Mohammad, et al.
Published: (2015)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Similar Items
-
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010) -
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014) -
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011) -
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011) -
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)