Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Reconfigurable intelligent surface for physical layer key generation: Constructive or destructive?

G Li, L Hu, P Staat, H Elders-Boll… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
Physical layer key generation (PKG) is a promising means to provide on-the-fly shared
secret keys by exploiting the intrinsic randomness of the radio channel. However, the …

Covert rate maximization in wireless full-duplex relaying systems with power control

R Sun, B Yang, S Ma, Y Shen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the fundamental covert rate performance in a wireless relaying
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …

On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach

M Ragheb, SMS Hemami, A Kuhestani… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is
investigated, where the secure source-to-destination communication is assisted by an …

Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications

J Li, P Wang, L Jiao, Z Yan, K Zeng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Ambient backscatter communication (AmBC) enables ultra-low-power communications by
backscattering ambient radio frequency (RF) signals and harvesting energy simultaneously …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Hardware-impaired PHY secret key generation with man-in-the-middle adversaries

M Letafati, H Behroozi, BH Khalaj… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the
presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from …

Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks

M Letafati, H Behroozi, BH Khalaj… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Wireless secret key generation (WSKG) allows efficient key agreement protocols for
securing the sixth generation (6G) wireless networks. Nevertheless, due to external …

IoT cybersecurity in 5G and beyond: a systematic literature review

S Pirbhulal, S Chockalingam, A Shukla… - International Journal of …, 2024 - Springer
Abstract The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature
of remote monitoring for different applications such as transportation, healthcare, and …

Short-packet amplify-and-forward relaying for the Internet-of-Things in the face of imperfect channel estimation and hardware impairments

V Shahiri, A Kuhestani, L Hanzo - IEEE Transactions on Green …, 2021 - ieeexplore.ieee.org
In next-generation wireless systems ultra-reliable low-latency communications (URLLC)
have to be realized in support of the Internet-of-things (IoT). However, this is quite a …