Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Physical layer secret key generation in static environments

N Aldaghri, H Mahdavifar - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …

A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

Data provenance for IoT with light weight authentication and privacy preservation

MN Aman, MH Basheer, B Sikdar - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) engulfs a large number of interconnected heterogeneous
devices from a wide range of pervasive application areas including health-care systems …

Survey on channel reciprocity based key establishment techniques for wireless systems

T Wang, Y Liu, AV Vasilakos - Wireless Networks, 2015 - Springer
Channel reciprocity based key establishment techniques have attracted more and more
attention from the wireless security research community for its easy implementation, low …

Key establishment for secure asymmetric cross-technology communication

W Wang, X Liu, Z Chi, S Ray, T Zhu - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
Recent advances in cross-technology communication can support direct communication
among heterogeneous IoT devices (ie, WiFi, ZigBee, and BLE) without requiring any …

Security-aware and privacy-preserving D2D communications in 5G

A Zhang, X Lin - IEEE Network, 2017 - ieeexplore.ieee.org
Device-to-device communication is a promising technology that can offload heavy traffic in
5G networks. However, due to its open nature, there are several security issues. The LTE-A …