Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Key generation from wireless channels: A review
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …
public key cryptography for the establishment of cryptographic keys between any two users …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
LoRa-key: Secure key generation system for LoRa-based network
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …
channels has attracted considerable attention in recent years. Despite much research efforts …
Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers
Key generation from the randomness of wireless channels is a promising technique to
establish a secret cryptographic key securely between legitimate users. This paper proposes …
establish a secret cryptographic key securely between legitimate users. This paper proposes …
Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review
It has been predicted that by the year 2030, 5G and beyond 5G (B5G) networks are
expected to provide hundreds of trillions of gigabytes of data for various emerging …
expected to provide hundreds of trillions of gigabytes of data for various emerging …
Secure wireless communications based on compressive sensing: A survey
Compressive sensing (CS) has become a popular signal processing technique and has
extensive applications in numerous fields such as wireless communications, image …
extensive applications in numerous fields such as wireless communications, image …
Experimental study on key generation for physical layer security in wireless communications
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …