Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for 6G: Toward achieving intelligent native security at layer-1

I Ara, B Kelley - IEEE Access, 2024 - ieeexplore.ieee.org
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G
communication operation mode. 6G mobile network will enable intelligent applications …

M2M technologies: Enablers for a pervasive Internet of Things

S Severi, F Sottile, G Abreu, C Pastrone… - … on Networks and …, 2014 - ieeexplore.ieee.org
We survey the state-of-the-art on the Internet-of-Things (IoT) from a wireless communications
point of view, as a result of the European FP7 project BUTLER which has its focus on …

Secret key generation using channel quantization with SVD for reciprocal MIMO channels

HM Furqan, JM Hamamreh… - … symposium on wireless …, 2016 - ieeexplore.ieee.org
The generation of secret keys from reciprocal wireless channel by exploiting their
randomness nature, is an emerging area of interest to provide secure communication. One …

Secret key generation protocol for optical OFDM systems in indoor VLC networks

YM Al-Moliki, MT Alresheedi… - IEEE Photonics …, 2017 - ieeexplore.ieee.org
Although the visible light communication (VLC) channel has superior security than radio
frequency channels, its broadcast character makes VLC links vulnerable to eavesdropping …

Group secret-key generation using algebraic rings in wireless networks

H Jagadeesh, R Joshi, M Rao - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow
multiple nodes of a wireless network to synthesize a common secret-key, which can be …

New chaotic encryption algorithm based on chaotic sequence and plain text

XY Wang, SX Gu - IET Information Security, 2014 - Wiley Online Library
A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and
plain text. First, the chaotic sequence and the plain text are used; the result is the key, so …

Secure and robust symmetric key generation using physical layer techniques under various wireless environments

C Sahin, B Katz, KR Dandekar - 2016 IEEE radio and wireless …, 2016 - ieeexplore.ieee.org
Due to the unavoidable shared nature of the wireless radio spectrum, providing security for
wireless communications presents unique challenges. Cryptographic keys have been used …

RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers

T Lu, L Chen, J Han, Y Wang, K Yu - Ad Hoc Networks, 2023 - Elsevier
Physical layer key generation is a lightweight technique to establish secret keys securely
between resource-constrained devices, but it is ineffective when wireless channels are static …

Physical layer authentication for automotive cyber physical systems based on modified HB protocol

AK Jadoon, J Li, L Wang - Frontiers of Computer Science, 2021 - Springer
Automotive cyber physical systems (CPSs) are ever more utilizing wireless technology for
V2X communication as a potential way out for challenges regarding collision detection, wire …