Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Achieving covert wireless communications using a full-duplex receiver
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
On optimizing VLC networks for downlink multi-user transmission: A survey
The evolving explosion in high data rate services and applications will soon require the use
of untapped, abundant unregulated spectrum of the visible light for communications to …
of untapped, abundant unregulated spectrum of the visible light for communications to …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
On covert communication with noise uncertainty
Prior studies on covert communication with noise uncertainty adopted a worst-case
approach from the warden's perspective. That is, the worst-case detection performance of …
approach from the warden's perspective. That is, the worst-case detection performance of …
Delay-intolerant covert communications with either fixed or random transmit power
In this paper, we study delay-intolerant covert communications in additive white Gaussian
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …
On the design of secure non-orthogonal multiple access systems
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …
Covert communication achieved by a greedy relay in wireless networks
Covert wireless communication aims to hide the very existence of wireless transmissions in
order to guarantee a strong security in wireless networks. In this paper, we examine the …
order to guarantee a strong security in wireless networks. In this paper, we examine the …
Physical-layer security for MISO visible light communication channels
This paper considers improving the confidentiality of visible light communication (VLC) links
within the framework of physical-layer security. We study a VLC scenario with one …
within the framework of physical-layer security. We study a VLC scenario with one …