Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C **ao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Coding for secrecy: An overview of error-control coding techniques for physical-layer security

WK Harrison, J Almeida, MR Bloch… - IEEE Signal …, 2013 - ieeexplore.ieee.org
While secrecy in communication systems has historically been obtained through
cryptographic means in the upper layers, recent research efforts have focused on the …

[BOOK][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Analog lagrange coded computing

M Soleymani, H Mahdavifar… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A distributed computing scenario is considered, where the computational power of a set of
worker nodes is used to perform a certain computation task over a dataset that is dispersed …

Deep joint source-channel and encryption coding: Secure semantic communications

TY Tung, D Gündüz - ICC 2023-IEEE International Conference …, 2023 - ieeexplore.ieee.org
Deep learning driven joint source-channel coding (JSCC) for wireless image or video
transmission, also called DeepJSCC, has been a topic of interest recently with very …

Multiuser MIMO concept for physical layer security in multibeam satellite systems

MG Schraml, RT Schwarz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In satellite communication downlinks, physical layer security is challenging to achieve due to
their broadcasting nature and Line-of-Sight channel characteristics. This paper provides a …