Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C **ao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

LoRa-key: Secure key generation system for LoRa-based network

W Xu, S Jha, W Hu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …

Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers

J Zhang, A Marshall, R Woods… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising technique to
establish a secret cryptographic key securely between legitimate users. This paper proposes …

Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review

H Sharma, N Kumar, R Tekchandani - Physical Communication, 2022 - Elsevier
It has been predicted that by the year 2030, 5G and beyond 5G (B5G) networks are
expected to provide hundreds of trillions of gigabytes of data for various emerging …

Secure wireless communications based on compressive sensing: A survey

Y Zhang, Y **ang, LY Zhang, Y Rong… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Compressive sensing (CS) has become a popular signal processing technique and has
extensive applications in numerous fields such as wireless communications, image …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …