Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
Reconfigurable intelligent surface for physical layer key generation: Constructive or destructive?
Physical layer key generation (PKG) is a promising means to provide on-the-fly shared
secret keys by exploiting the intrinsic randomness of the radio channel. However, the …
secret keys by exploiting the intrinsic randomness of the radio channel. However, the …
Covert rate maximization in wireless full-duplex relaying systems with power control
R Sun, B Yang, S Ma, Y Shen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the fundamental covert rate performance in a wireless relaying
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …
system consisting of a source-destination pair, a full-duplex (FD) relay and a warden, where …
On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach
M Ragheb, SMS Hemami, A Kuhestani… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is
investigated, where the secure source-to-destination communication is assisted by an …
investigated, where the secure source-to-destination communication is assisted by an …
Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications
Ambient backscatter communication (AmBC) enables ultra-low-power communications by
backscattering ambient radio frequency (RF) signals and harvesting energy simultaneously …
backscattering ambient radio frequency (RF) signals and harvesting energy simultaneously …
Covertness and secrecy study in untrusted relay-assisted D2D networks
R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …
Hardware-impaired PHY secret key generation with man-in-the-middle adversaries
In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the
presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from …
presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from …
Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks
Wireless secret key generation (WSKG) allows efficient key agreement protocols for
securing the sixth generation (6G) wireless networks. Nevertheless, due to external …
securing the sixth generation (6G) wireless networks. Nevertheless, due to external …
IoT cybersecurity in 5G and beyond: a systematic literature review
Abstract The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature
of remote monitoring for different applications such as transportation, healthcare, and …
of remote monitoring for different applications such as transportation, healthcare, and …
Short-packet amplify-and-forward relaying for the Internet-of-Things in the face of imperfect channel estimation and hardware impairments
In next-generation wireless systems ultra-reliable low-latency communications (URLLC)
have to be realized in support of the Internet-of-things (IoT). However, this is quite a …
have to be realized in support of the Internet-of-things (IoT). However, this is quite a …