Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
An overview of physical layer security in wireless communication systems with CSIT uncertainty
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …
imperfections, such as noise and fading, into a source of security. This is established …
Cache-enabled physical layer security for video streaming in backhaul-limited cellular networks
L ** channel estimation
Anti-eavesdrop** channel estimation (ANECE) is useful for a network of cooperative full-
duplex radio devices/users. Using ANECE, a secret key can be generated by each pair of …
duplex radio devices/users. Using ANECE, a secret key can be generated by each pair of …
Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots
A wireless network of full-duplex nodes/users, using anti-eavesdrop** channel estimation
(ANECE) based on collaborative pilots, can yield a positive secure degree-of-freedom …
(ANECE) based on collaborative pilots, can yield a positive secure degree-of-freedom …
Secret key generation from MIMO channel with or without reciprocity
This paper presents a generalized channel probing (GCP) method and a generalized pre-
processing (GPP) method as two consecutive frontend steps for secret key generation from a …
processing (GPP) method as two consecutive frontend steps for secret key generation from a …