Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information-
theoretical security and signal processing to secure physical layer systems. Although the …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …

Vulnerability and protection of channel state information in multiuser MIMO networks

YC Tung, S Han, D Chen, KG Shin - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Multiple-In-Multiple-Out (MIMO) offers great potential for increasing network capacity by
exploiting spatial diversity with multiple antennas. Multiuser MIMO (MU-MIMO) further …

Exploiting full-duplex receivers for achieving secret communications in multiuser MISO networks

B Akgun, OO Koyluoglu, M Krunz - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider a broadcast channel in which a multi-antenna transmitter (Alice) sends K
confidential information signals to K legitimate users (Bobs) in the presence of L …

Toward proper guard zones for link signature

X He, H Dai, W Shen, P Ning… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Motivated by information-theoretic security, link signature (LS)-based security mechanisms
exploit the ample channel characteristics between wireless devices for security …

Proactive anti-eavesdrop** with trap deployment in wireless networks

Q He, S Fang, T Wang, Y Liu, S Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the open nature of the wireless medium, wireless communications are especially
vulnerable to eavesdrop** attacks. This article designs a new wireless communication …

New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation

M Adil, HU Khan, M Arif, MS Nawaz, F Khan - IEEE Access, 2024 - ieeexplore.ieee.org
Physical Layer-based Secret Key Generation (PLSKG) between the legitimate nodes from
the reciprocal wireless channel is a vastly studied area of Physical Layer Security (PLS) …

ShieldScatter: Improving IoT security with backscatter assistance

Z Luo, W Wang, J Qu, T Jiang, Q Zhang - … of the 16th ACM conference on …, 2018 - dl.acm.org
The lightweight protocols and low-power radio technologies open up many opportunities to
facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes …