Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Key generation from wireless channels: A review
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …
public key cryptography for the establishment of cryptographic keys between any two users …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
Physical layer security for the Internet of Things: Authentication and key generation
A low-complexity, yet secure framework is proposed for protecting the IoT and for achieving
both authentication and secure communication. In particular, the slight random difference …
both authentication and secure communication. In particular, the slight random difference …
Physical layer key generation in wireless networks: challenges and opportunities
K Zeng - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable research attention in recent years. Although theoretical …
channels has attracted considerable research attention in recent years. Although theoretical …
Secret key generation for intelligent reflecting surface assisted wireless communication networks
We propose and analyze secret key generation using intelligent reflecting surface (IRS)
assisted wireless communication networks. To this end, we first formulate the minimum …
assisted wireless communication networks. To this end, we first formulate the minimum …
LoRa-key: Secure key generation system for LoRa-based network
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …
channels has attracted considerable attention in recent years. Despite much research efforts …
Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers
Key generation from the randomness of wireless channels is a promising technique to
establish a secret cryptographic key securely between legitimate users. This paper proposes …
establish a secret cryptographic key securely between legitimate users. This paper proposes …
BCAuth: Physical layer enhanced authentication and attack tracing for backscatter communications
Backscatter communication (BC) enables ultra-low-power communications and allows
devices to harvest energy simultaneously. But its practical deployment faces severe security …
devices to harvest energy simultaneously. But its practical deployment faces severe security …