[HTML][HTML] A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

[КНИГА][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

The best defense is a good offense: Adversarial attacks to avoid modulation detection

MZ Hameed, A György… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider a communication scenario, in which an intruder tries to determine the
modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the …

Communication without interception: Defense against modulation detection

MZ Hameed, A György… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
We consider a communication scenario, in which an intruder tries to determine the
modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the …

Variations on a theme by Schalkwijk and Kailath

RG Gallager, B Nakiboğlu - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
Schalkwijk and Kailath (1966) developed a class of block codes for Gaussian channels with
ideal feedback for which the probability of decoding error decreases as a second-order …

Physical layer security protocol for Poisson channels for passive man-in-the-middle attack

M Hayashi, Á Vázquez-Castro - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this work, we focus on the classical optical channel having Poissonian statistical behavior
and propose a novel secrecy coding-based physical layer protocol. Our protocol is different …

The role of feedback in two-way secure communications

X He, A Yener - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
Most practical communication links are bidirectional. In these models, since the source node
also receives signals, its encoder has the option of computing its output based on the …