{"id":"https://openalex.org/W2787567666","doi":"https://doi.org/10.1109/glocomw.2017.8269228","title":"How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario","display_name":"How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2787567666","doi":"https://doi.org/10.1109/glocomw.2017.8269228","mag":"2787567666"},"language":"en","primary_location":{"id":"doi:10.1109/glocomw.2017.8269228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2017.8269228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108652607","display_name":"Selahattin Goekceli","orcid":null},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Selahattin Goekceli","raw_affiliation_strings":["Istanbul Teknik Universitesi, Istanbul, TR"],"affiliations":[{"raw_affiliation_string":"Istanbul Teknik Universitesi, Istanbul, TR","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055262309","display_name":"Oezge Cepheli","orcid":null},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Oezge Cepheli","raw_affiliation_strings":["Wireless Communications Research Laboratory, Istanbul Technical University, Turkey"],"affiliations":[{"raw_affiliation_string":"Wireless Communications Research Laboratory, Istanbul Technical University, Turkey","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058443945","display_name":"Semiha Tedik Ba\u015faran","orcid":"https://orcid.org/0000-0003-2636-143X"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Semiha Tedik Basaran","raw_affiliation_strings":["Wireless Communications Research Laboratory, Istanbul Technical University, Turkey"],"affiliations":[{"raw_affiliation_string":"Wireless Communications Research Laboratory, Istanbul Technical University, Turkey","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022600471","display_name":"G\u00fcne\u015f Karabulut Kurt","orcid":"https://orcid.org/0000-0001-7188-2619"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Guenes Karabulut Kurt","raw_affiliation_strings":["Wireless Communications Research Laboratory, Istanbul Technical University, Turkey"],"affiliations":[{"raw_affiliation_string":"Wireless Communications Research Laboratory, Istanbul Technical University, Turkey","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091189894","display_name":"Guido Dartmann","orcid":"https://orcid.org/0000-0002-6786-6664"},"institutions":[{"id":"https://openalex.org/I137932638","display_name":"Trier University of Applied Sciences","ror":"https://ror.org/02e3hdx05","country_code":"DE","type":"education","lineage":["https://openalex.org/I137932638"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Guido Dartmann","raw_affiliation_strings":["University of Applied Sciences Trier, Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Trier, Germany","institution_ids":["https://openalex.org/I137932638"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050903837","display_name":"Gerd Ascheid","orcid":"https://orcid.org/0000-0003-4068-3558"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gerd Ascheid","raw_affiliation_strings":["The Institute for Communication Technologies and Embedded Systems, RWTH Aachen University, Germany"],"affiliations":[{"raw_affiliation_string":"The Institute for Communication Technologies and Embedded Systems, RWTH Aachen University, Germany","institution_ids":["https://openalex.org/I887968799"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108652607"],"corresponding_institution_ids":["https://openalex.org/I48912391"],"apc_list":null,"apc_paid":null,"fwci":0.5843,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71708279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"pp","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8160656690597534},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8151066303253174},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.814478874206543},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7748009562492371},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.6249437928199768},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5222464203834534},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45297613739967346},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.41637688875198364},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4016071557998657},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3989279568195343},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3775308132171631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.314902126789093},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16174101829528809}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8160656690597534},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8151066303253174},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.814478874206543},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7748009562492371},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.6249437928199768},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5222464203834534},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45297613739967346},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.41637688875198364},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4016071557998657},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3989279568195343},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3775308132171631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.314902126789093},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16174101829528809}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/glocomw.2017.8269228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2017.8269228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},{"id":"pmh:oai:polen.itu.edu.tr:11527/32854","is_oa":false,"landing_page_url":"https://hdl.handle.net/11527/32854","pdf_url":null,"source":{"id":"https://openalex.org/S4306400460","display_name":"Istanbul Technical University Academic Open Archive (Istanbul Technical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I48912391","host_organization_name":"Istanbul Technical University","host_organization_lineage":["https://openalex.org/I48912391"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"pmh:oai:publications.polymtl.ca:47658","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/47658/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1586672422","https://openalex.org/W1676835812","https://openalex.org/W1931921331","https://openalex.org/W1967219667","https://openalex.org/W1976426492","https://openalex.org/W1979349986","https://openalex.org/W1993465712","https://openalex.org/W2054692642","https://openalex.org/W2059799853","https://openalex.org/W2114004090","https://openalex.org/W2154668180","https://openalex.org/W2248823781","https://openalex.org/W2279957075","https://openalex.org/W2285307366","https://openalex.org/W2288116481","https://openalex.org/W2291419536","https://openalex.org/W2293855231","https://openalex.org/W2338802329","https://openalex.org/W2434225773","https://openalex.org/W2787295408","https://openalex.org/W6695644692","https://openalex.org/W6703657241"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W3026705917","https://openalex.org/W2462883630","https://openalex.org/W2516026999","https://openalex.org/W2155410265","https://openalex.org/W2769689807","https://openalex.org/W3188430173","https://openalex.org/W4287776800"],"abstract_inverted_index":{"Expanding":[0],"usage":[1],"of":[2,13,21,112,144,181],"mobile":[3],"technologies":[4],"and":[5,38,69,97,107,122],"devices":[6,24,150],"causes":[7],"new":[8],"challenges,":[9],"especially":[10],"in":[11,76,102,136],"terms":[12],"security.":[14],"In":[15,86],"the":[16,19,165,179],"near":[17],"future,":[18],"number":[20],"battery":[22],"powered":[23],"will":[25],"also":[26],"significantly":[27],"increase.":[28],"Current":[29],"security":[30,55,79,98],"approaches":[31],"are":[32,42,74,156],"not":[33,43],"sufficient":[34],"for":[35,45],"these":[36,50,125],"issues":[37],"high-complexity":[39],"cryptographic":[40],"techniques":[41,63],"suitable":[44],"such":[46,64],"devices.":[47],"To":[48],"address":[49],"problems,":[51],"physical":[52],"layer":[53],"(PHY)":[54],"solutions":[56,80],"have":[57],"recently":[58],"emerged.":[59],"Some":[60],"5G":[61],"candidate":[62],"as":[65,158],"full-duplex":[66],"communication":[67],"(FD)":[68],"artificial":[70],"noise":[71],"transmission":[72,120],"(AN)":[73],"exploited":[75],"various":[77],"PHY":[78],"due":[81],"to":[82,116,123,160],"their":[83],"performance":[84],"advantages.":[85],"this":[87,113],"study,":[88],"a":[89,92,140],"scenario":[90],"resembling":[91],"factory":[93],"environment":[94],"is":[95,100,115,134],"considered":[96],"level":[99],"analyzed":[101],"real-time":[103],"by":[104,127,178],"utilizing":[105],"FD":[106],"AN":[108,182],"methods.":[109],"The":[110],"aim":[111],"analysis":[114],"investigate":[117],"physically":[118],"secure":[119,173],"regions":[121,126,174],"expand":[124],"intelligently":[128],"using":[129],"AN.":[130],"Our":[131],"proposed":[132],"approach":[133],"evaluated":[135],"real-":[137],"time":[138],"with":[139,151,170],"testbed":[141],"that":[142],"consists":[143],"software":[145],"defined":[146],"radios":[147],"(SDRs).":[148],"Two":[149],"very":[152],"different":[153],"front-end":[154],"characteristics":[155],"utilized":[157],"eavesdroppers":[159,184],"analyze":[161],"hardware":[162],"effects":[163],"on":[164,183],"eavesdropping":[166],"performance.":[167],"As":[168],"observed":[169],"experiments,":[171],"robust":[172],"can":[175],"be":[176],"created":[177],"use":[180],"effectively.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
