A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Physical-layer security for industrial wireless control systems: Basics and future directions
Wireless networks for industrial control systems are promising because of their reduced cost,
flexible structure, and improved long-term reliability. However, wireless control systems are …
flexible structure, and improved long-term reliability. However, wireless control systems are …
Optimal power adaptation in covert communication with an uninformed jammer
K Li, PA Kelly, D Goeckel - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Covert communication is achieved if a transmitter (Alice) sends a message to a legitimate
receiver (Bob) without being detected by an attentive warden (Willie). Recent work has taken …
receiver (Bob) without being detected by an attentive warden (Willie). Recent work has taken …
Experimental study on key generation for physical layer security in wireless communications
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …
Injecting reliable radio frequency fingerprints using metasurface for the Internet of Things
In Internet of Things, where billions of devices with limited resources are communicating with
each other, security has become a major stumbling block affecting the progress of this …
each other, security has become a major stumbling block affecting the progress of this …
Joint precoding and phase shift design in reconfigurable intelligent surfaces-assisted secret key generation
Physical layer key generation (PLKG) is a promising technique to establish symmetric keys
between resource-constrained legitimate users. However, PLKG suffers from a low key rate …
between resource-constrained legitimate users. However, PLKG suffers from a low key rate …
Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems
The frame preamble in current WiFi systems is designed to facilitate various PHY-layer
functions, including frequency offset estimation and frame detection. However, this preamble …
functions, including frequency offset estimation and frame detection. However, this preamble …
The passive eavesdropper affects my channel: Secret-key rates under real-world conditions
Channel-reciprocity based key generation (CRKG) has gained significant importance as it
has recently been proposed as a potential lightweight security solution for IoT devices …
has recently been proposed as a potential lightweight security solution for IoT devices …
Clone detection based on BPNN and physical layer reputation for industrial wireless CPS
F Pan, H Wen, X Gao, H Pu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial wireless cyber-physical systems are vulnerable to malicious node attacks, for
example, clone node attack. The existing clone detection schemes are either based on …
example, clone node attack. The existing clone detection schemes are either based on …