Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

Cache-enabled physical layer security for video streaming in backhaul-limited cellular networks

L ** channel estimation
S Wu, Y Hua - IEEE Transactions on Signal Processing, 2022 - ieeexplore.ieee.org
Anti-eavesdrop** channel estimation (ANECE) is useful for a network of cooperative full-
duplex radio devices/users. Using ANECE, a secret key can be generated by each pair of …

Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots

Y Hua, Q Liang, MS Rahman - IEEE Transactions on Signal …, 2023 - ieeexplore.ieee.org
A wireless network of full-duplex nodes/users, using anti-eavesdrop** channel estimation
(ANECE) based on collaborative pilots, can yield a positive secure degree-of-freedom …

Secret key generation from MIMO channel with or without reciprocity

Y Hua, A Maksud - … on Information Sciences and Systems (CISS …, 2023 - ieeexplore.ieee.org
This paper presents a generalized channel probing (GCP) method and a generalized pre-
processing (GPP) method as two consecutive frontend steps for secret key generation from a …