Introduction for PHY Security

  • Hong WenEmail author
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


Wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. They are open to outside intrusions without the need of physical connections. The wireless security has become a critical concern in the physical layer. Physical-layer (PHY) security techniques, which are based on the Shannon secrecy model [1] are effective in resolving the boundary, efficiency and link reliability issues. In addition, the security in classical cryptography system is based on unproven assumptions regarding the hardness of certain computational tasks. Therefore, systems are insecure if assumptions are wrong or if efficient attacks are developed.


Wireless Network Authentication Scheme Space Time Block Code Intended Receiver Sybil Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© The Author(s) 2013

Authors and Affiliations

  1. 1.National Key Laboratory of Science and Technology on CommunicationsUniversity of Electronic Science and Technology of ChinaChengduPeople’s Republic of China

Personalised recommendations