Study On Physical Layer Wireless Security Techniques

Authors

  • Lemya Computer Science, APJ Abdul kalam Technological University, India
  • Meera VM Computer Science, Cusat University, India
  • Thrupthi A Computer Science, APJ Abdul Kalam Technological University, India

Keywords:

Wireless communications security, physical layer security, information-theoretic secrecy, artificial noise

Abstract

Communication security is an essential and progressively difficult issue in wireless networks. Physical-layer approach to secret key generation which is each quick and independent of channel variations is taken into account. This approach makes a receiver jam the signal during a manner that also permits it to decrypt the info, nevertheless prevents alternative nodes from cryptography. Another well-known approach for achieving information-theoretic secrecy depends on deploying artificial noises to blind the intruders’ interception within the physical layer. A multiple inter-symbol obfuscation (MIO) theme is planned, that utilizes a collection of artificial vociferous symbols to alter the initial knowledge symbols within the physical layer. MIO will effectively enhance the wireless communications security.

References

S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent,” in Proc. IEEE INFOCOM, Apr. 2011, pp. 1125–1133.

Tao Xiong, Wei Lou, Jin Zhang, Hailun Tan, MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation, IEEE, VOL. 10,NO. 8, pp.1678-1691, 2015.

M. I. Husain, S. Mahant, and R. Sridhar, “CD-PHY: Physical layer security in wireless networks through constellation diversity,” in Proc. IEEE MILCOM, Oct./Nov. 2012, pp. 1–9.

Block Cipher Encryption Process, www.nist.gov/bcencrypt, Mar 12, 2015.

Charalampos N. Pitas, Christos E. Tsirakis, “Emerging communication technologies and security challenges in a smart grid wireless ecosystem”, Int. Journal of Wireless and Mobile Computing,Vol. 7, No.3 pp. 231 – 245, 2014.

Downloads

Published

2025-11-11

How to Cite

[1]
S. Lemya, V. Meera, and A. Thrupthi, “Study On Physical Layer Wireless Security Techniques”, Int. J. Comp. Sci. Eng., vol. 4, no. 11, pp. 53–56, Nov. 2025.