Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Physical layer secret key generation in static environments
Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …
Secret key generation for intelligent reflecting surface assisted wireless communication networks
We propose and analyze secret key generation using intelligent reflecting surface (IRS)
assisted wireless communication networks. To this end, we first formulate the minimum …
assisted wireless communication networks. To this end, we first formulate the minimum …
On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems
Channel reciprocity-based key generation (CRKG) has recently emerged as a new
technique to address the problem of key distribution in wireless networks. However, as this …
technique to address the problem of key distribution in wireless networks. However, as this …
Towards secure 5G networks: A Survey
S Zhang, Y Wang, W Zhou - Computer Networks, 2019 - Elsevier
To support various new use cases from vertical industries besides enhanced mobile
broadband communication services, the 5G system aims to provide higher speed, lower …
broadband communication services, the 5G system aims to provide higher speed, lower …
Random shifting intelligent reflecting surface for OTP encrypted data transmission
In this letter, we propose a novel encrypted data transmission scheme using an intelligent
reflecting surface (IRS) to generate secret keys in wireless communication networks. We …
reflecting surface (IRS) to generate secret keys in wireless communication networks. We …
Jamming-resilient frequency hop**-aided secure communication for Internet-of-Things in the presence of an untrusted relay
In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things
(IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative …
(IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative …