A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Nonorthogonal multiple access for 5G and beyond
Driven by the rapid escalation of the wireless capacity requirements imposed by advanced
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
This paper investigates the physical layer security of non-orthogonal multiple access
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
A systematic review on NOMA variants for 5G and beyond
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …
various end-user applications in the fifth-generation (5G) of wireless networks. During this …
A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions
Interference is traditionally viewed as a performance limiting factor in wireless
communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of …
communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of …
Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints
A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …
massive deployment of machine-type communication (MTC) devices. The limited hardware …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …