Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Physical layer security for beyond 5G: Ultra secure low latency communications

AK Yerrapragada, T Eisman… - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
If Beyond-5G (B5G)/6G is to support critical infrastructure worldwide, there must be an effort
to jointly integrate low latency and privacy into wireless protocols. This research analyzes …

Secure communications in tiered 5G wireless networks with cooperative jamming

Y Huo, X Fan, L Ma, X Cheng, Z Tian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cooperative jamming is deemed as a promising physical layer-based approach to secure
wireless transmissions in the presence of eavesdroppers. In this paper, we investigate …

New physical layer key generation dimensions: Subcarrier indices/positions-based key generation

HM Furqan, JM Hamamreh… - IEEE Communications …, 2020 - ieeexplore.ieee.org
In this letter, novel algorithms for secret key generation from the wireless channel in multi-
carrier systems are proposed for ensuring the confidentiality and authentication in wireless …

Physical layer security for 6G: Toward achieving intelligent native security at layer-1

I Ara, B Kelley - IEEE Access, 2024 - ieeexplore.ieee.org
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G
communication operation mode. 6G mobile network will enable intelligent applications …

Joint PHY/MAC layer security design using ARQ with MRC and null-space independent PAPR-aware artificial noise in SISO systems

JM Hamamreh, H Arslan - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
Automatic-repeat-request (ARQ) as a MAC layer mechanism and artificial noise (AN) as a
physical layer mechanism along with the help of maximal ratio combining (MRC), are jointly …

A channel frequency response-based secret key generation scheme in in-band full-duplex MIMO-OFDM systems

H Luo, N Garg, T Ratnarajah - IEEE Journal on Selected Areas …, 2023 - ieeexplore.ieee.org
Physical layer-based secret key generation (PHY-SKG) schemes have attracted significant
attention in recent years due to their lightweight implementation and ability to achieve …

Securing NextG networks with physical-layer key generation: A survey

Q **ao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

Exploiting multi-antenna non-reciprocal channels for shared secret key generation

D Qin, Z Ding - IEEE Transactions on information forensics and …, 2016 - ieeexplore.ieee.org
Traditional physical-layer (PHY)-based secret key generation schemes typically assume
reciprocity of forward and reverse channels in order for facilitated shared secrecy. However …