2016
DOI: 10.1109/jproc.2016.2558521
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
554
0
6

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 1,076 publications
(560 citation statements)
references
References 169 publications
0
554
0
6
Order By: Relevance
“…The data integrity may be breached by having a malicious node in the network. This can be solved through the utilization of the automatic code update and recovery process [18]. Availability to ensure that the network is able to provide services at any time for the authorized users.…”
Section: A Security Requirementsmentioning
confidence: 99%
“…The data integrity may be breached by having a malicious node in the network. This can be solved through the utilization of the automatic code update and recovery process [18]. Availability to ensure that the network is able to provide services at any time for the authorized users.…”
Section: A Security Requirementsmentioning
confidence: 99%
“…An important information conveyed by [7,8] is that PLS techniques have enormous potential in future 5th-generation (5G) secure communications. However, most of these works are based on point-to-point communications, where the node locations and topology of networks are determined and static.…”
Section: Introductionmentioning
confidence: 99%
“…However, with the rapid popularity of UAVs in the consumer market, criminals or terrorists can potentially use them to establish wireless communication for committing crimes and terrorism [5,6]. Therefore, there is a growing need for government agencies to legitimately monitor and eavesdrop wireless communications of suspicious UAVs [7]. In particular, we consider a surveillance scenario as shown in Fig.…”
Section: Introductionmentioning
confidence: 99%