Wireless Security

Wireless transmissions are vulnerable against eavesdropping due to the broadcasting nature. Thus, it is often required to consider secure transmissions using encryption. While existing ciphers can be used as in wired transmissions, a group of new approaches based on physical layer security (PLS) has been studied in order to exploit wireless channels. For the Internet of Things (IoT) and wireless sensor networks (WSN), PLS based secure transmission schemes become good candidates in order to provide small devices of limiting computing power with lightweight security. The list of our related publications is as follows.



  • J. Choi, “Channel-aware randomized encryption and channel estimation attack,” IEEE Access, vol. 5, no. 1, pp. 25046–25054, December 2017. [pdf]
  • Y. Lee, H. Jo, Y. Ko, and J. Choi, “Secure index and data symbol modulation for OFDM-IM,” IEEE Access, vol. 5, no. 1, pp. 24959-24974, December 2017. [pdf]
  • J. Choi, “Noncoherent OFDM-IM and its performance analysis,” IEEE Trans. Wireless Commun., vol. 17, no. 1, pp. 352-360. [pdf]
  • J. Choi, “Physical layer security for channel-aware random access with opportunistic jamming,” IEEE Trans.Information Forensics and Security, vol. 12, no. 11, pp. 2699-2711, November 2017. [pdf]
  • J. Choi, “Secret key transmission for OFDM based machine type Communications,” J. Communications and Networks (JCN), vol. 19, no. 4, pp. 363–370, August 2017. [pdf]
  • J. Choi, “Coded OFDM-IM with transmit diversity,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3164–3171, July 2017. [pdf]
  • J. Choi and E. Hwang, “Secure Multiple Access based on Multicarrier CDMA with Induced Random Flipping,” IEEE Trans. Veh. Tech., vol. 66, no. 6, pp.  5099-5108, June 2017. [pdf]
  • J. Choi, “On Channel-Aware Secure HARQ-IR,” IEEE Trans. Information Forensics and Security, vol. 12, no. 2, pp. 351-362, February 2017. [pdf]
  • J. Choi, “Secure Transmissions via Compressive Sensing in Multicarrier Systems,” IEEE Signal Proc. Letters, vol. 20, no. 3, pp. 1315–1319, October 2016. [pdf]
  • J. Choi, “A robust beamforming approach to guarantee instantaneous secrecy rate,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1076–1085, February 2016. [pdf]

Conference Proceedings

  • J.Choi,“Secrecy Rate of Channel-Aware Randomized Secure Transmission Schemes in Multicarrier Systems,” in Proc. IEEE ICTC 2016, Oct. 2017, Jeju, Korea. [pdf]
  • Y. Lee, H. Jo, and J. Choi, “Compressive Sensing based Physical Layer Authentication for Wireless Energy Auditing Networks,” in Proc. IEEE APWCS-2017, Incheon, Korea, Aug. 2017. [pdf]
  • Z. Yuan, C. Chen, L. Bai, Y. Jin, and J. Choi, “Secure Relay Beamforming with Correlated Channel Models in Dual-hop Wireless Communication Networks,” in Proc. IEEE Globecom, Dec. 2016. [pdf]
  • J. Choi, K. Lee, Y. Lee, and N. Y. Yu, “Secure Compressive Random Access for Meter Reading in Smart Grid using Multi-Antenna Access Point,” in Proc. IEEE SmartGridComm-2016, Sydney, Australia, Nov. 2016. [pdf]
  • J. Choi, “Full-Duplexing Jamming Attack for Active Eavesdropping,” in Proc. International Conference on IT Convergence and Security 2016, Prague, Czech, Sep. 2016. [pdf]
  • Y. Lee, B. Sun, J. Kim, and J. Choi, “Beamforming for Secure Antenna Subset Modulation in Micro-wave Systems,” in Proc. IEEE APWCS-2016, Tokyo, Japan, Aug. 2016. [pdf]
  • J. Choi and J. Ha, “Secret Key Transmission Based on Channel Reciprocity for Secure IoT,” in Proc. IEEE EuCNC 2016, Athens, Greece, June 2016. [pdf]
  • J. Choi and E. Hwang, “Secure Multicarrier DS/SS with Induced Random Flipping,” in Proc. IEEE ICC 2016, Malaysia, May 2016. [pdf]