Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014‏ - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Securing NextG networks with physical-layer key generation: A survey

Q **ao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024‏ - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015‏ - ieeexplore.ieee.org
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …

An investigation of using loop-back mechanism for channel reciprocity enhancement in secret key generation

P Linning, G Li, J Zhang, R Woods… - IEEE transactions on …, 2018‏ - ieeexplore.ieee.org
Physical layer security key generation exploits unpredictable features from wireless
channels to achieve high security, which requires high reciprocity in order to set up …

Secret key generation using channel quantization with SVD for reciprocal MIMO channels

HM Furqan, JM Hamamreh… - … symposium on wireless …, 2016‏ - ieeexplore.ieee.org
The generation of secret keys from reciprocal wireless channel by exploiting their
randomness nature, is an emerging area of interest to provide secure communication. One …

Reliability and latency analysis for wireless communication systems with a secret-key budget

KL Besser, RF Schaefer, HV Poor - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
We consider a wireless communication system with a passive eavesdropper, in which a
transmitter and legitimate receiver generate and use key bits to secure the transmission of …

Secret key generation with cross multiplication of two-way random signals

L **, S Zhang, Y Lou, X Xu, Z Zhong - IEEE Access, 2019‏ - ieeexplore.ieee.org
The secret key generation rate (SKGR) of current physical layer security methods is not high
enough for practical requirements. A novel SKG method based on the cross multiplication …

Secret key generation from reciprocal spatially correlated MIMO channels

EA Jorswieck, A Wolf… - 2013 IEEE Globecom …, 2013‏ - ieeexplore.ieee.org
Secret key generation from reciprocal multi-antenna channels is an interesting alternative to
cryptographic key management in wireless systems without infrastructure access. In this …

Secure multiantenna transmission with an unknown eavesdropper: Power allocation and secrecy outage analysis

S Jia, J Zhang, S Chen, W Hao… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
This paper investigates the power allocation problem for secure multiple-input single-output
transmission with the injection of artificial noise (AN), in the presence of an unknown …

Secret-key agreement for security in multi-emitter visible light communication systems

A Mukherjee - IEEE Communications Letters, 2016‏ - ieeexplore.ieee.org
This letter examines secret key agreement for physical layer security in multiple-input single-
output (MISO) visible light communications (VLC) systems. Upper and lower bounds are …