Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Physical layer secret key generation in static environments

N Aldaghri, H Mahdavifar - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the
wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use …

Advances on security threats and countermeasures for cognitive radio networks: A survey

RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …

Secure beamforming for MIMO two-way communications with an untrusted relay

J Mo, M Tao, Y Liu, R Wang - IEEE Transactions on Signal …, 2014 - ieeexplore.ieee.org
This paper studies the secure beamforming design in a multiple-antenna three-node system
where two source nodes exchange messages with the help of an untrusted relay node. The …

Physical-layer secret and private key generation in wireless relay networks with correlated eavesdropping channels

P Xu, J Yang, G Chen, Z Yang, Y Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the performance of key generation between two nodes assisted by a
relay in the presence of correlated eavesdropping channels. A cooperative jamming scheme …

Physical-layer secret key generation with colluding untrusted relays

CDT Thai, J Lee, TQS Quek - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
In this paper, we propose a physical-layer secret key generation scheme for multiantenna
legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas …