Skip to main content

2016 | OriginalPaper | Buchkapitel

3. Joint Physical–Application Layer Security

verfasst von : Aiqing Zhang, Liang Zhou, Lei Wang

Erschienen in: Security-Aware Device-to-Device Communications Underlaying Cellular Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the explosive growth of mobile data traffic, wireless multimedia content delivery turns to be an important application in D2D communications. In this chapter, we focus on the security for wireless multimedia transmission over D2D communications. The existing security methods consider physical-layer and application-layer security technologies independently while both of them have significant impact on security performance. Thus, we propose a joint framework involving both the physical-layer and application-layer security technologies. It is well known that the network resources are expected to be utilized efficiently by exploiting the secrecy capacity and signal processing technologies at the physical-layer as well as the authentication and watermarking strategies at the application-layer. We also design a novel network-aware security protection strategy which is implemented in a distributed manner. It achieves a tradeoff between the security level and communication overhead, which facilitates its deployment in large-scale wireless multimedia systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72CrossRef Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72CrossRef
2.
Zurück zum Zitat Mukherjee A, Fakoorian S, Huang J, Swindlehurst A (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tutorils 16(3):1550–1573CrossRef Mukherjee A, Fakoorian S, Huang J, Swindlehurst A (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tutorils 16(3):1550–1573CrossRef
3.
5.
Zurück zum Zitat Yuksel M, Erkip E (2007) Secure communication with a relay helping the wiretapper. IEEE Information Theory Workshop, Lake Tahoe Yuksel M, Erkip E (2007) Secure communication with a relay helping the wiretapper. IEEE Information Theory Workshop, Lake Tahoe
6.
Zurück zum Zitat Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W, Mandayam N (2010) Exploiting the physical layer for enhanced security. IEEE Wirel Commun 17(5):63–70CrossRef Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W, Mandayam N (2010) Exploiting the physical layer for enhanced security. IEEE Wirel Commun 17(5):63–70CrossRef
8.
Zurück zum Zitat Bassily R, Ekrem E, He X, Tekin E, Xie J, Bloch MR, Ulukus S, Yener A (2013) Cooperative security at the physical layer. IEEE Signal Process Mag 30(5):16–28CrossRef Bassily R, Ekrem E, He X, Tekin E, Xie J, Bloch MR, Ulukus S, Yener A (2013) Cooperative security at the physical layer. IEEE Signal Process Mag 30(5):16–28CrossRef
9.
Zurück zum Zitat Shu Z, Qian Y, Ci S (2013) On physical layer security for cognitive radio networks. IEEE Netw 27(3):28–33CrossRef Shu Z, Qian Y, Ci S (2013) On physical layer security for cognitive radio networks. IEEE Netw 27(3):28–33CrossRef
10.
Zurück zum Zitat Zou Y, Wang X, Shen W (2013) Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commun 61(12):2103–5113CrossRef Zou Y, Wang X, Shen W (2013) Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans Commun 61(12):2103–5113CrossRef
11.
Zurück zum Zitat Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31(10):2099–2111CrossRef Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31(10):2099–2111CrossRef
12.
Zurück zum Zitat Mo J, Tao M, Liu Y (2012) Relay placement for physical layer security: a secure connection perspective. IEEE Commun Lett 16(6):878–881CrossRef Mo J, Tao M, Liu Y (2012) Relay placement for physical layer security: a secure connection perspective. IEEE Commun Lett 16(6):878–881CrossRef
13.
Zurück zum Zitat Dong L, Han Z, Petropulu AP, Poor HV (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process (58)3:1875–1888 Dong L, Han Z, Petropulu AP, Poor HV (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process (58)3:1875–1888
14.
Zurück zum Zitat Li J, Petropulu AP, Weber S (2011) On cooperative relaying schemes for wireless physical layer security. IEEE Trans Signal Process 59(10):4985–4997MathSciNetCrossRef Li J, Petropulu AP, Weber S (2011) On cooperative relaying schemes for wireless physical layer security. IEEE Trans Signal Process 59(10):4985–4997MathSciNetCrossRef
15.
Zurück zum Zitat Lee E, Gerla M, Oh SY (2012) Physical layer security in wireless smart grid. IEEE Commun Mag 50(3):46–52CrossRef Lee E, Gerla M, Oh SY (2012) Physical layer security in wireless smart grid. IEEE Commun Mag 50(3):46–52CrossRef
16.
Zurück zum Zitat Li X, Chen M, Ratazzi EP (2005) Array-transmission based physical-layer security techniques for wireless sensor networks. Proceedings of the IEEE International Conference on Mechatronics and Automation, Niagara Falls, Canada Li X, Chen M, Ratazzi EP (2005) Array-transmission based physical-layer security techniques for wireless sensor networks. Proceedings of the IEEE International Conference on Mechatronics and Automation, Niagara Falls, Canada
17.
Zurück zum Zitat Soosahabi R, Naraghi-Pour M (2012) Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Trans Inf Forensics Secur 7(4):1118–1126CrossRef Soosahabi R, Naraghi-Pour M (2012) Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Trans Inf Forensics Secur 7(4):1118–1126CrossRef
18.
Zurück zum Zitat Wang H, Zhou X, Reed MC (2013) Physical layer security in cellular networks: a stochastic geometry approach. IEEE Trans Wirel Commun 12(6):2776–2787 Dhillon Wang H, Zhou X, Reed MC (2013) Physical layer security in cellular networks: a stochastic geometry approach. IEEE Trans Wirel Commun 12(6):2776–2787 Dhillon
19.
Zurück zum Zitat Wang H, Zhou X, Reed MC (2013) On the physical layer security in large scale cellular networks. IEEE Wireless Communications and Networking Conference (WCNC) Wang H, Zhou X, Reed MC (2013) On the physical layer security in large scale cellular networks. IEEE Wireless Communications and Networking Conference (WCNC)
20.
Zurück zum Zitat Geraci G, Dhillon HS, Andrews JG, Yuan J, Collings IB (2014) A new model for physical layer security in cellular networks. IEEE International Conference on Communications, Sydney, Australia Geraci G, Dhillon HS, Andrews JG, Yuan J, Collings IB (2014) A new model for physical layer security in cellular networks. IEEE International Conference on Communications, Sydney, Australia
21.
Zurück zum Zitat Geraci G, Dhillon HS, Andrews JG, Yuan J, Collings IB (2014) Physical layer security in downlink multi-antenna cellular networks. IEEE Trans Commun 62(6):2006–2021CrossRef Geraci G, Dhillon HS, Andrews JG, Yuan J, Collings IB (2014) Physical layer security in downlink multi-antenna cellular networks. IEEE Trans Commun 62(6):2006–2021CrossRef
22.
23.
Zurück zum Zitat Azimi-Sadjadi B, Kiayias A, Mercado A, Yener B (2007) Robust key generation from signal envelopes in wireless networks. ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA Azimi-Sadjadi B, Kiayias A, Mercado A, Yener B (2007) Robust key generation from signal envelopes in wireless networks. ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA
24.
Zurück zum Zitat Liu H, Wang Y, Yang J, Chen Y (2013) Fast and practical secret key extraction by exploiting channel response. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy Liu H, Wang Y, Yang J, Chen Y (2013) Fast and practical secret key extraction by exploiting channel response. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy
25.
Zurück zum Zitat Xi W, Li X, Qian C, Han J, Tang S, Zhao J, Zhao K (2014) KEEP: fast secret key extraction protocol for D2D communications. IEEE International Symposium of Quality of Service (IWQoS), Hong Kong, China Xi W, Li X, Qian C, Han J, Tang S, Zhao J, Zhao K (2014) KEEP: fast secret key extraction protocol for D2D communications. IEEE International Symposium of Quality of Service (IWQoS), Hong Kong, China
26.
Zurück zum Zitat Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Las Vegas, NV, USA Sayeed A, Perrig A (2008) Secure wireless communications: secret keys through multipath. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Las Vegas, NV, USA
27.
Zurück zum Zitat Wang Q, Su H, Ren K, Kim K (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China Wang Q, Su H, Ren K, Kim K (2011) Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China
28.
Zurück zum Zitat Croft J, Patwari N, Kasera S (2010) Robust uncorrelated bit extraction methodologies for wireless sensors. ACM/IEEE International Conference on Network Protocols (ICNP), Kyoto, Japan Croft J, Patwari N, Kasera S (2010) Robust uncorrelated bit extraction methodologies for wireless sensors. ACM/IEEE International Conference on Network Protocols (ICNP), Kyoto, Japan
29.
Zurück zum Zitat Patwari N, Croft J, Jana S,Kasera S (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput 9(1):17–30CrossRef Patwari N, Croft J, Jana S,Kasera S (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput 9(1):17–30CrossRef
30.
Zurück zum Zitat Zeng K, Wu D, Chan A, Mohapatra P (2010) Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, USA Zeng K, Wu D, Chan A, Mohapatra P (2010) Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, USA
31.
Zurück zum Zitat Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radiotelepathy: extracting a secret key from an unauthenticated wireless channel. ACM International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA, USA Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radiotelepathy: extracting a secret key from an unauthenticated wireless channel. ACM International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA, USA
32.
Zurück zum Zitat Zhu X, Xu F, Novak E, Tan CC, Li Q, Chen G (2013) Extracting secret key from wireless link dynamics in vehicular environments. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy Zhu X, Xu F, Novak E, Tan CC, Li Q, Chen G (2013) Extracting secret key from wireless link dynamics in vehicular environments. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy
33.
Zurück zum Zitat Liu H, Yang J, Wang Y, Chen Y (2012) Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA Liu H, Yang J, Wang Y, Chen Y (2012) Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA
34.
Zurück zum Zitat Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. International Conference on Computing, Networking and Communications, Wireless Ad Hoc and Sensor Networks Symposium (WiMob), Barcelona, SpainCrossRef Zan B, Gruteser M, Hu F (2012) Improving robustness of key extraction from wireless channels with differential techniques. International Conference on Computing, Networking and Communications, Wireless Ad Hoc and Sensor Networks Symposium (WiMob), Barcelona, SpainCrossRef
35.
Zurück zum Zitat Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mobile Comput 12(5):917–930CrossRef Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mobile Comput 12(5):917–930CrossRef
36.
Zurück zum Zitat Ren K, Su H, Wang Q (2011) Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel Commun 18(8):6–12CrossRef Ren K, Su H, Wang Q (2011) Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel Commun 18(8):6–12CrossRef
37.
Zurück zum Zitat Wang N, Zhang N, Aaron Gulliver T ( 2014) Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Trans Inf Forensics Secur 9(2):272–284CrossRef Wang N, Zhang N, Aaron Gulliver T ( 2014) Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Trans Inf Forensics Secur 9(2):272–284CrossRef
38.
Zurück zum Zitat Huang P, Wang X (2013) Fast secret key generation in static wireless networks: a virtual channel approach. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy Huang P, Wang X (2013) Fast secret key generation in static wireless networks: a virtual channel approach. IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy
39.
Zurück zum Zitat Wilhelm M, Martinovic I, Schmitt JB (2013) Secure key generation in sensor networks based on frequency-selective channels. IEEE J Sel Areas Commun 31(9):1779–1790CrossRef Wilhelm M, Martinovic I, Schmitt JB (2013) Secure key generation in sensor networks based on frequency-selective channels. IEEE J Sel Areas Commun 31(9):1779–1790CrossRef
40.
Zurück zum Zitat Gollakota S, Katabi D (2011) Physical layer wireless security made fast and channel independent. IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China Gollakota S, Katabi D (2011) Physical layer wireless security made fast and channel independent. IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China
42.
Zurück zum Zitat Lai L, El Gamal H, Poor HV (2009) Authentication over noisy channels. IEEE Trans Inf Theory (55)2:906–916 Lai L, El Gamal H, Poor HV (2009) Authentication over noisy channels. IEEE Trans Inf Theory (55)2:906–916
43.
Zurück zum Zitat Yu PL, Baras J, Sadler B (2008) Physical-layer authentication. IEEE Trans Inf Forensics Secur 3(1):38–51CrossRef Yu PL, Baras J, Sadler B (2008) Physical-layer authentication. IEEE Trans Inf Forensics Secur 3(1):38–51CrossRef
44.
Zurück zum Zitat Wen H, Wang Y, Zhu X, Li J, Zhou L (2013) Physical layer assist authentication technique for smart meter system. IET Commun 7(3):189–197CrossRef Wen H, Wang Y, Zhu X, Li J, Zhou L (2013) Physical layer assist authentication technique for smart meter system. IET Commun 7(3):189–197CrossRef
45.
Zurück zum Zitat Wen H, Ho PH, Qi C, Gong G (2010) Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf Secur 4(4):390–396CrossRef Wen H, Ho PH, Qi C, Gong G (2010) Physical layer assisted authentication for distributed ad hoc wireless sensor networks. IET Inf Secur 4(4):390–396CrossRef
46.
Zurück zum Zitat Shi L, Li M, Yu S, Yuan J (2013) BANA: body area network authentication exploiting channel characteristics. IEEE J on Sel Areas Commun 31(9):1803–1816CrossRef Shi L, Li M, Yu S, Yuan J (2013) BANA: body area network authentication exploiting channel characteristics. IEEE J on Sel Areas Commun 31(9):1803–1816CrossRef
47.
Zurück zum Zitat Shi L, Yuan J, Yu S, Li M (2015) MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks. IEEE Internet Things J 2(1):52–62CrossRef Shi L, Yuan J, Yu S, Li M (2015) MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks. IEEE Internet Things J 2(1):52–62CrossRef
48.
Zurück zum Zitat Du X, Shan D, Zeng K, Huie L (2014) Physical layer challenge-response authentication in wireless networks with relay. IEEE Conference on Computer CommunicationsCrossRef Du X, Shan D, Zeng K, Huie L (2014) Physical layer challenge-response authentication in wireless networks with relay. IEEE Conference on Computer CommunicationsCrossRef
49.
Zurück zum Zitat Liu FJ, Wang X, Primak SL ( 2013) A two dimensional quantization algorithm for CIR-based physical layer authentication. IEEE International Conference on CommunicationsCrossRef Liu FJ, Wang X, Primak SL ( 2013) A two dimensional quantization algorithm for CIR-based physical layer authentication. IEEE International Conference on CommunicationsCrossRef
50.
Zurück zum Zitat Tugnait JK (2013) Wireless user authentication via comparison of power spectral densities. IEEE J Sel Areas Commun 31(9):1791–1802CrossRef Tugnait JK (2013) Wireless user authentication via comparison of power spectral densities. IEEE J Sel Areas Commun 31(9):1791–1802CrossRef
51.
Zurück zum Zitat Hou W, Wang X, Chouinard J, Refaey A (2014) Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans Commun 62(5):1658–1667CrossRef Hou W, Wang X, Chouinard J, Refaey A (2014) Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans Commun 62(5):1658–1667CrossRef
52.
Zurück zum Zitat Borle KM, Chen B, Du W (2015) Physical layer spectrum usage authentication in cognitive radio: analysis and implementation. IEEE Trans Inf Theory Forensics Secur 10(10):2225–2235CrossRef Borle KM, Chen B, Du W (2015) Physical layer spectrum usage authentication in cognitive radio: analysis and implementation. IEEE Trans Inf Theory Forensics Secur 10(10):2225–2235CrossRef
53.
Zurück zum Zitat Verma G, Yu P, Sadler BM (2015) Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access 3(2):81–88CrossRef Verma G, Yu P, Sadler BM (2015) Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access 3(2):81–88CrossRef
54.
Zurück zum Zitat Yu PL, Verma G, Sadler BM (2015) Wireless physical layer authentication via fingerprint embedding. IEEE Commun Mag 53(6):48–53MathSciNetCrossRef Yu PL, Verma G, Sadler BM (2015) Wireless physical layer authentication via fingerprint embedding. IEEE Commun Mag 53(6):48–53MathSciNetCrossRef
55.
Zurück zum Zitat Shiu YS, Chang SY,Wu HC,Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74CrossRef Shiu YS, Chang SY,Wu HC,Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74CrossRef
56.
Zurück zum Zitat Shu Z, Qian Y, Ci S (2013) On physical layer security for cognitive radio networks. IEEE Netw 27(3):28–33CrossRef Shu Z, Qian Y, Ci S (2013) On physical layer security for cognitive radio networks. IEEE Netw 27(3):28–33CrossRef
57.
Zurück zum Zitat Simmons GJ (1992) Contemporary cryptography. IEEE, New York Simmons GJ (1992) Contemporary cryptography. IEEE, New York
58.
Zurück zum Zitat Sun Q, Apostolopoulos J, Chen CW, Chang SF (2008) Quality-optimized and secure end-to-end authentication for media delivery. Proc IEEE 96(1):97–111CrossRef Sun Q, Apostolopoulos J, Chen CW, Chang SF (2008) Quality-optimized and secure end-to-end authentication for media delivery. Proc IEEE 96(1):97–111CrossRef
59.
Zurück zum Zitat Li Z, Sun Q, Lian Y, Chen CW (2007) Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Trans Multimedia 9(4):837–850CrossRef Li Z, Sun Q, Lian Y, Chen CW (2007) Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Trans Multimedia 9(4):837–850CrossRef
60.
Zurück zum Zitat Lai CF, Huang YM, Chao HC (2010) DLNA-based multimedia sharing system over OSGI framework with extension to P2P network. IEEE Syst J 4(2):262–270CrossRef Lai CF, Huang YM, Chao HC (2010) DLNA-based multimedia sharing system over OSGI framework with extension to P2P network. IEEE Syst J 4(2):262–270CrossRef
61.
Zurück zum Zitat Gennaro R, Rohatgi P (1997) How to sign digital streams. Proceedings of Advances in Cryptology (CRYPTO’97), pp 180–197 Gennaro R, Rohatgi P (1997) How to sign digital streams. Proceedings of Advances in Cryptology (CRYPTO’97), pp 180–197
62.
Zurück zum Zitat Zhou L, Chao HC, Vasilakos A (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367CrossRef Zhou L, Chao HC, Vasilakos A (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367CrossRef
63.
Zurück zum Zitat Zhang Z, Sun Q, Wong WC (2005) A proposal of butterfly-graph based stream authentication over lossy networks. Proceedings of IEEE International Conference on Multimedia and Expo (ICME) Zhang Z, Sun Q, Wong WC (2005) A proposal of butterfly-graph based stream authentication over lossy networks. Proceedings of IEEE International Conference on Multimedia and Expo (ICME)
64.
Zurück zum Zitat Chan CF (2003) A graph-theoretical analysis of multicast authentication. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS’03): 155–160. Chan CF (2003) A graph-theoretical analysis of multicast authentication. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS’03): 155–160.
65.
Zurück zum Zitat Lysyanskaya RT, Triandopoulos N (2004) Multicast authentication in fully adversarial networks. Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp 241–248 Lysyanskaya RT, Triandopoulos N (2004) Multicast authentication in fully adversarial networks. Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp 241–248
66.
Zurück zum Zitat Sun Q, He D, Tian Q (2006) A secure and robust authentication scheme for video transcoding. IEEE Trans Circuits Syst Video Technol 16(10):1232–1244CrossRef Sun Q, He D, Tian Q (2006) A secure and robust authentication scheme for video transcoding. IEEE Trans Circuits Syst Video Technol 16(10):1232–1244CrossRef
67.
Zurück zum Zitat Sun Q, Ye S, Lin CY, Chang SF (2005) A crypto signature scheme for image authentication over wireless channel. Int J Image Graph 5(1):1–14CrossRef Sun Q, Ye S, Lin CY, Chang SF (2005) A crypto signature scheme for image authentication over wireless channel. Int J Image Graph 5(1):1–14CrossRef
68.
Zurück zum Zitat Vidyasagar MP, Song H, Elizabeth C (2005) A survey of digital image watermarking techniques. Proceedings of the 2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Vidyasagar MP, Song H, Elizabeth C (2005) A survey of digital image watermarking techniques. Proceedings of the 2005 3rd IEEE International Conference on Industrial Informatics (INDIN)
69.
Zurück zum Zitat Wu D, Cai Y, Zhou L,Wang J (2012) A cooperative communication scheme based on dynamic coalition formation game in clustered wireless sensor networks. IEEE Trans Wirel Commun 11(3):1190–1200CrossRef Wu D, Cai Y, Zhou L,Wang J (2012) A cooperative communication scheme based on dynamic coalition formation game in clustered wireless sensor networks. IEEE Trans Wirel Commun 11(3):1190–1200CrossRef
Metadaten
Titel
Joint Physical–Application Layer Security
verfasst von
Aiqing Zhang
Liang Zhou
Lei Wang
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-32458-6_3