Reference Hub2
Physical Layer Security in Wireless Communication Networks

Physical Layer Security in Wireless Communication Networks

Özge Cepheli, Güneş Karabulut Kurt
ISBN13: 9781466646919|ISBN10: 1466646918|EISBN13: 9781466646926
DOI: 10.4018/978-1-4666-4691-9.ch004
Cite Chapter Cite Chapter

MLA

Cepheli, Özge, and Güneş Karabulut Kurt. "Physical Layer Security in Wireless Communication Networks." Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, edited by Danda B. Rawat, et al., IGI Global, 2014, pp. 61-81. https://doi.org/10.4018/978-1-4666-4691-9.ch004

APA

Cepheli, Ö. & Kurt, G. K. (2014). Physical Layer Security in Wireless Communication Networks. In D. Rawat, B. Bista, & G. Yan (Eds.), Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (pp. 61-81). IGI Global. https://doi.org/10.4018/978-1-4666-4691-9.ch004

Chicago

Cepheli, Özge, and Güneş Karabulut Kurt. "Physical Layer Security in Wireless Communication Networks." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, edited by Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, 61-81. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4691-9.ch004

Export Reference

Mendeley
Favorite

Abstract

Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networks still remains a challenge. Secure transmission techniques in these networks are discussed throughout this chapter. PHY security measures, the secrecy rate, the secrecy capacity, and the outage secrecy rate are introduced. Security needs of wireless networks are discussed and the related common attack types are described. Main countermeasures that are proposed to prevent these attacks are also presented with both practical and theoretical perspectives.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.