A Survey of Different Security Methods in the Physical Layer of TCP/IP Model

dc.contributor.authorNoor Raad Saadallah
dc.contributor.authorAbdulrahman Kh. Alhafid
dc.contributor.authorHuda Aqeel Al-Tayyar
dc.contributor.authorQutaiba I. Ali
dc.date.accessioned2026-01-01T21:14:46Z
dc.date.issued2021-11-10
dc.description.abstractIn the previous two decades, cybersecurity risks and challenges in communications networks, especially in wireless networks, have increased tremendously. Wireless networks are insecure and potentially come under attack from eavesdropping, jamming, and interference because of the nature of the wireless channel characteristics. As conventional technologies that are secure are insufficient for the physical layer of wireless systems. Security vulnerabilities at the physical layer became a focal point of discussion. Any assaults from an attacker or weaknesses in the network reflect a detrimental effect on the network's usual operation. The investigation of any threat and its countermeasures consider an important step to secure networks. While many network security surveys have been seen in the literature, a few studies address and focus on the physical layer security and its challenges, which plays an important role in communications. Therefore, in this paper, we will highlight the security mechanisms in the physical layer which can be used to protect data and obtain secure reliable communication. A modern overview of the current physical layer and its security studies are required on the dangers, detection, and anti-measuring strategies. in this study, several attacks on the physical layer are described and analyzed. Methods of detection and countermeasures are also discussed and contrasted for each assault. Also, attention to the challenges and future directions have been included in the rest of the paper.
dc.formatapplication/pdf
dc.identifier.urihttps://geniusjournals.org/index.php/erb/article/view/104
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/66535
dc.language.isoeng
dc.publisherGenius Journals
dc.relationhttps://geniusjournals.org/index.php/erb/article/view/104/86
dc.sourceEurasian Research Bulletin ; Vol. 2 (2021): ERB; 11-27
dc.source2795-7675
dc.subjectWireless networks
dc.subjectWireless Systems
dc.subjectPhysical Layer
dc.subjectNetwork Security
dc.titleA Survey of Different Security Methods in the Physical Layer of TCP/IP Model
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
saadallah_2021_a_survey_of_different_security_methods_i.pdf
item.page.filesection.size
437.26 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections