{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T12:07:48Z","timestamp":1762862868890,"version":"3.41.2"},"reference-count":34,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T00:00:00Z","timestamp":1482105600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans. Emerging Tel. Tech."],"published-print":{"date-parts":[[2017,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Wireless communications' infrastructures are frequently selected as a cable replacement in many applications giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of Internet, its layered protocol stack did not consider security as a primary concern. Because then, a significant amount of literature has been published. This paper proposes a watermark\u2010based blind physical layer security utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the watermark\u2010based blind physical layer security aims to be a valuable technique for deploying physical layer security. Authors utilized 2 performance metrics, the outage probability of secrecy capacity for assessing the secure communication effectiveness and the error probability for evaluating the watermark extraction process. Finally, the proposed protocol improves the secrecy capacity performance if compared with other protocols, and moreover, it has a lower energy consumption.<\/jats:p>","DOI":"10.1002\/ett.3142","type":"journal-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T05:46:48Z","timestamp":1482126408000},"source":"Crossref","is-referenced-by-count":29,"title":["Physical layer security based on spread\u2010spectrum watermarking and jamming receiver"],"prefix":"10.1002","volume":"28","author":[{"given":"Simone","family":"Soderi","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications University of Oulu  Oulu Finland"},{"name":"Alstom Ferroviaria  Florence Italy"}]},{"given":"Lorenzo","family":"Mucchi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering University of Florence  Florence Italy"}]},{"given":"Matti","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications University of Oulu  Oulu Finland"}]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[{"name":"Department of Information Engineering University of Florence  Florence Italy"}]},{"given":"Jari","family":"Iinatti","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications University of Oulu  Oulu Finland"}]}],"member":"311","published-online":{"date-parts":[[2016,12,19]]},"reference":[{"volume-title":"Security Engineering \u2010 A Guide to Building Dependable Distributed Systems","year":"2008","author":"Anderson RJ","key":"e_1_2_7_2_1"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2265141"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"SoderiS DainelliG IinattiJ HamalainenM.Signal fingerprinting in cognitive wireless networks. Paper presented at: 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM); June2014;Oulu.","DOI":"10.4108\/icst.crowncom.2014.255374"},{"key":"e_1_2_7_5_1","unstructured":"List of Wireless Network Attacks. Available from:http:\/\/www.brighthub.com\/computing\/smb-security\/articles\/53949.aspx. Accessed 19 January 2011."},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_2_7_10_1","article-title":"A cryptographic treatment of the wiretap channel","volume":"1201","author":"Bellare M","year":"2012","journal-title":"CoRR"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"KoMiyong GoeckelDL.Wireless physical\u2010layer security performance of UWB systems. Paper presented at: IEEE Military Communications Conference MILCOM 2010;October 2010;San Jose CA.","DOI":"10.1109\/MILCOM.2010.5680483"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2195491"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"e_1_2_7_15_1","doi-asserted-by":"crossref","unstructured":"MathurS MN YeC ReznikA.Radio\u2010telepathy: extracting a secret key from an unauthenticated wireless channel. Paper presented at: MobiCom '08;2008;San Francisco CA.","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"JanaS PremnathSNa ClarkM KaseraSK PatwariN KrishnamurthySV.On the effectiveness of secret key extraction from wireless signal strength in real environments. Paper presented at: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking MobiCom '09;2009;Beijing China.","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_2_7_17_1","unstructured":"JeonH KimN KimM LeeH HaJ.Secrecy capacity over correlated ergodic fading channel. Paper presented at: IEEE Military Communications Conference MILCOM 2008;November 2008;San Diego CA."},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.013014.131037"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.090323"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2111370"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"GollakotaS KatabiD.Physical layer wireless security made fast and channel independent. Proceedings IEEE INFOCOM;2011;Shanghai China.","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","unstructured":"LiX YuC HizlanM taeKimW ParkS.Physical layer watermarking of direct sequence spread spectrum signals. IEEE Military Communications Conference MILCOM 2013;2013;San Diego CA.","DOI":"10.1109\/MILCOM.2013.88"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5979-7"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809385"},{"key":"e_1_2_7_27_1","unstructured":"MaurerU WolfS.From weak to strong information\u2010theoretic key agreement. Paper presented at: IEEE International Symposium on Information Theory;2000;Sorrento Italy."},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"e_1_2_7_29_1","doi-asserted-by":"crossref","unstructured":"BarrosJ RodriguesMRD.Secrecy capacity of wireless channels. 2006 IEEE International Symposium on Information Theory;2006;Seattle WA.","DOI":"10.1109\/ISIT.2006.261613"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2008764"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"volume-title":"Introduction to Spread Spectrum Communications","year":"1995","author":"Peterson RL","key":"e_1_2_7_32_1"},{"key":"e_1_2_7_33_1","doi-asserted-by":"crossref","unstructured":"RabbachinA ContiA WinM.Intentional Network Interference for Denial of Wireless Eavesdropping. Paper presented at: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011);December 2011;Houston Texas.","DOI":"10.1109\/GLOCOM.2011.6134361"},{"volume-title":"Probability, Random Variables, and Stochastic Processes","year":"1991","author":"Papoulis A","key":"e_1_2_7_34_1"},{"issue":"3","key":"e_1_2_7_35_1","first-page":"307","article-title":"Record Values of the Ratio of Rayleigh Random Variables","volume":"27","author":"Shakil M","year":"2011","journal-title":"Pak J Stat"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.3142","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.3142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T12:31:23Z","timestamp":1693657883000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.3142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,19]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["10.1002\/ett.3142"],"URL":"https:\/\/doi.org\/10.1002\/ett.3142","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"type":"print","value":"2161-3915"},{"type":"electronic","value":"2161-3915"}],"subject":[],"published":{"date-parts":[[2016,12,19]]},"article-number":"e3142"}}