Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2020
DOI: 10.1145/3395351.3399365
|View full text |Cite
|
Sign up to set email alerts
|

Security in terahertz WLANs with Leaky wave antennas

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…To understand the security performance of angularly dispersive link, in this paper, a parallel-plate leaky-wave antenna (LWA) with the angular dispersion property [15] is employed for THz directional transmission. We denote the known frequency-dependent emission angle relationship by 𝜃 𝑚𝑎𝑥 (𝑓 ), and the electric field generated by the LWA by 𝐺 (𝑓 , 𝜃 ), both can be obtained before the deployment using an analytical model [6,14] or via over-the-air measurements.…”
Section: System Model 21 Angularly Dispersive Linkmentioning
confidence: 99%
See 2 more Smart Citations
“…To understand the security performance of angularly dispersive link, in this paper, a parallel-plate leaky-wave antenna (LWA) with the angular dispersion property [15] is employed for THz directional transmission. We denote the known frequency-dependent emission angle relationship by 𝜃 𝑚𝑎𝑥 (𝑓 ), and the electric field generated by the LWA by 𝐺 (𝑓 , 𝜃 ), both can be obtained before the deployment using an analytical model [6,14] or via over-the-air measurements.…”
Section: System Model 21 Angularly Dispersive Linkmentioning
confidence: 99%
“…To secure the angularly dispersive LWA link as defined in Sec. 2, we propose to perform cross-channel coding for the frequencychannelized transmission, leveraging the property that Eve only receives a subset of frequency channels well, but not all [15]. To demonstrate our idea, we specify a cross-channel coding scheme, which we term SCADL (Secure Coding for Angularly Dispersive Links), based on information theory and is adapted from prior work [9].…”
Section: Secure Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…As a low-cost and easy-to-manufacture travelingwave antenna, leaky-wave antenna can provide frequency-dependent narrow beams with high antenna gains [17], and own frequency-scanning capability [18,19]. It has been utilized in many areas such as frequency-division multiplexing THz communication [20], THz radar sensing [21][22][23], link discovery [14], and physical layer security enhancement [24]. One key feature of the leaky-wave antenna is that it enables the information transmissions in a spatial-spectral manner, i.e., frequencies are correlated with the transmission directions.…”
Section: Introductionmentioning
confidence: 99%
“…The aforementioned works only study the case of point-to-point THz communication with leaky-wave antenna [20,24]. When there exist large numbers of transceivers in the THz networks with massive connections, the co-channel interference has an adverse effect on the transmission rate, which needs to be evaluated.…”
Section: Introductionmentioning
confidence: 99%