Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Covert communication over noisy channels: A resolvability perspective

MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …

Hiding information in noise: Fundamental limits of covert wireless communication

BA Bash, D Goeckel, D Towsley… - IEEE Communications …, 2015 - ieeexplore.ieee.org
Widely deployed encryption-based security prevents unauthorized decoding, but does not
ensure undetectability of communication. However, covert, or low probability of …

On physical-layer concepts and metrics in secure signal transmission

E Güvenkaya, JM Hamamreh, H Arslan - Physical Communication, 2017 - Elsevier
Communication secrecy in the wireless systems has unique challenges due to broadcasting
nature of the radio waves, as compared to its wire-line counterpart. At the same time …

Wireless physical layer security

HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
Security in wireless networks has traditionally been considered to be an issue to be
addressed separately from the physical radio transmission aspects of wireless systems …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …

Semantically secure lattice codes for the Gaussian wiretap channel

C Ling, L Luzzi, JC Belfiore… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We propose a new scheme of wiretap lattice coding that achieves semantic security and
strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the …

Effective secrecy: Reliability, confusion and stealth

J Hou, G Kramer - 2014 IEEE International Symposium on …, 2014 - ieeexplore.ieee.org
A security measure called effective security is defined that includes strong secrecy and
stealth communication. Effective secrecy ensures that a message cannot be deciphered and …

Error-control coding for physical-layer secrecy

M Bloch, M Hayashi, A Thangaraj - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The renewed interest for physical-layer security techniques has put forward a new role for
error-control codes. In addition to ensuring reliability, carefully designed codes have been …

Achievability proof via output statistics of random binning

MH Yassaee, MR Aref, A Gohari - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper introduces a new and ubiquitous framework for establishing achievability results
in network information theory problems. The framework uses random binning arguments …