A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Nonorthogonal multiple access for 5G and beyond

Y Liu, Z Qin, M Elkashlan, Z Ding… - Proceedings of the …, 2017 - ieeexplore.ieee.org
Driven by the rapid escalation of the wireless capacity requirements imposed by advanced
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks

Y Liu, Z Qin, M Elkashlan, Y Gao… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates the physical layer security of non-orthogonal multiple access
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …

A systematic review on NOMA variants for 5G and beyond

I Budhiraja, N Kumar, S Tyagi, S Tanwar, Z Han… - IEEE …, 2021 - ieeexplore.ieee.org
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …

A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions

A Li, D Spano, J Krivochiza… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Interference is traditionally viewed as a performance limiting factor in wireless
communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …