Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
While secrecy in communication systems has historically been obtained through
cryptographic means in the upper layers, recent research efforts have focused on the …
cryptographic means in the upper layers, recent research efforts have focused on the …
[BOOK][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Analog lagrange coded computing
M Soleymani, H Mahdavifar… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A distributed computing scenario is considered, where the computational power of a set of
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
worker nodes is used to perform a certain computation task over a dataset that is dispersed …
Deep joint source-channel and encryption coding: Secure semantic communications
Deep learning driven joint source-channel coding (JSCC) for wireless image or video
transmission, also called DeepJSCC, has been a topic of interest recently with very …
transmission, also called DeepJSCC, has been a topic of interest recently with very …
Multiuser MIMO concept for physical layer security in multibeam satellite systems
MG Schraml, RT Schwarz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In satellite communication downlinks, physical layer security is challenging to achieve due to
their broadcasting nature and Line-of-Sight channel characteristics. This paper provides a …
their broadcasting nature and Line-of-Sight channel characteristics. This paper provides a …