WCNC 2016 Physical-Layer Security Workshop

Physical-Layer Security: Rise, Fall and Rise Again Trilogy

Toward Securing Data Networks

IEEE WCNC 2016, 3-6 April 2016, Doha, Qatar

Physical-layer security is a new, groundbreaking approach to provide security for wireless communication networks, by exploiting the unique characteristics of the wireless communication channel in the physical layer. Physical-layer security uses advanced coding, communication and signal processing techniques to secure wireless communications in the physical-layer. While higher layer encryption techniques are deployed in virtually every system, new communication networks are emerging in which traditional cryptography solutions are not so easily implemented. For instance, wireless sensors or RFID tags are subject to stringent energy and complexity constraints that make it challenging to deploy an off-the-shelf public-key infrastructure. More generally, the distributed and heterogeneous nature of modern wireless networks renders the problem of key distribution more intricate than in traditional networks.

This workshop aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on fundamental and practically relevant questions related to the many challenges arising from secure PHY communications. In line with such objectives, original contributions are solicited in topics of interest to include, but not limited to, the following:

  • Secure methodologies and architectures for mobile and wireless networks,
  • Secure signal processing,
  • Secure fundamental theory,
  • Secure advanced spatial diversity techniques (secure cooperative communications, secure two-way cooperative communications, secure MIMO communications and secure cognitive radio systems),
  • Secure resource allocation (secure optimization, secure cross-layer optimization and game theory techniques),
  • Multi-user information theoretical security (coordinated design and distributed design),
  • Cross-layer designs for security,
  • Security and privacy in the Internet of Things,
  • Security and quantum communications,
  • Trust, security and privacy in e-government, e-systems & social networking,
  • Trust, security and privacy in cloud computing, Performance of practical testbeds for PHY security.