Cognitive security of wireless communication systems in the physical layer

Mustafa Harun Yilmaz*, Ertuǧrul Güvenkaya, Haji M. Furqan, Selçuk Köse, Hüseyin Arslan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)

Abstract

While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS) concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

Original languageEnglish
Article number3592792
JournalWireless Communications and Mobile Computing
Volume2017
DOIs
Publication statusPublished - 2017
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2017 Mustafa Harun Yilmaz et al.

Fingerprint

Dive into the research topics of 'Cognitive security of wireless communication systems in the physical layer'. Together they form a unique fingerprint.

Cite this