Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for 6G: Toward achieving intelligent native security at layer-1
I Ara, B Kelley - IEEE Access, 2024 - ieeexplore.ieee.org
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G
communication operation mode. 6G mobile network will enable intelligent applications …
communication operation mode. 6G mobile network will enable intelligent applications …
M2M technologies: Enablers for a pervasive Internet of Things
We survey the state-of-the-art on the Internet-of-Things (IoT) from a wireless communications
point of view, as a result of the European FP7 project BUTLER which has its focus on …
point of view, as a result of the European FP7 project BUTLER which has its focus on …
Secret key generation using channel quantization with SVD for reciprocal MIMO channels
HM Furqan, JM Hamamreh… - … symposium on wireless …, 2016 - ieeexplore.ieee.org
The generation of secret keys from reciprocal wireless channel by exploiting their
randomness nature, is an emerging area of interest to provide secure communication. One …
randomness nature, is an emerging area of interest to provide secure communication. One …
Secret key generation protocol for optical OFDM systems in indoor VLC networks
YM Al-Moliki, MT Alresheedi… - IEEE Photonics …, 2017 - ieeexplore.ieee.org
Although the visible light communication (VLC) channel has superior security than radio
frequency channels, its broadcast character makes VLC links vulnerable to eavesdropping …
frequency channels, its broadcast character makes VLC links vulnerable to eavesdropping …
Group secret-key generation using algebraic rings in wireless networks
H Jagadeesh, R Joshi, M Rao - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow
multiple nodes of a wireless network to synthesize a common secret-key, which can be …
multiple nodes of a wireless network to synthesize a common secret-key, which can be …
New chaotic encryption algorithm based on chaotic sequence and plain text
XY Wang, SX Gu - IET Information Security, 2014 - Wiley Online Library
A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and
plain text. First, the chaotic sequence and the plain text are used; the result is the key, so …
plain text. First, the chaotic sequence and the plain text are used; the result is the key, so …
Secure and robust symmetric key generation using physical layer techniques under various wireless environments
C Sahin, B Katz, KR Dandekar - 2016 IEEE radio and wireless …, 2016 - ieeexplore.ieee.org
Due to the unavoidable shared nature of the wireless radio spectrum, providing security for
wireless communications presents unique challenges. Cryptographic keys have been used …
wireless communications presents unique challenges. Cryptographic keys have been used …
RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers
Physical layer key generation is a lightweight technique to establish secret keys securely
between resource-constrained devices, but it is ineffective when wireless channels are static …
between resource-constrained devices, but it is ineffective when wireless channels are static …
Physical layer authentication for automotive cyber physical systems based on modified HB protocol
AK Jadoon, J Li, L Wang - Frontiers of Computer Science, 2021 - Springer
Automotive cyber physical systems (CPSs) are ever more utilizing wireless technology for
V2X communication as a potential way out for challenges regarding collision detection, wire …
V2X communication as a potential way out for challenges regarding collision detection, wire …