Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Johannes RichterElke FranzSabrina EngelmannStefan PfennigEduard A. JorswieckPublished in: CAMAD (2013)
Keyphrases
- physical layer
- network layer
- multi hop
- application layer
- transport layer
- routing protocol
- computer networks
- network architecture
- wireless networks
- ad hoc networks
- cross layer
- wireless sensor networks
- end to end
- wireless communication
- data transmission
- mac layer
- ddos attacks
- security policies
- channel coding
- mobile ad hoc networks
- video streaming
- energy efficient
- wireless ad hoc networks
- key management
- multipath
- base station