Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Security trends in Internet of Things: A survey
Abstract The Internet of Things (IoT) is a network of embedded devices that are uniquely
identifiable and have embedded software required to communicate between the transient …
identifiable and have embedded software required to communicate between the transient …
Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
Review and evaluation of MAC protocols for satellite IoT systems using nanosatellites
T Ferrer, S Céspedes, A Becerra - Sensors, 2019 - mdpi.com
Extending the internet of things (IoT) networks to remote areas under extreme conditions or
for serving sometimes unpredictable mobile applications has increased the need for satellite …
for serving sometimes unpredictable mobile applications has increased the need for satellite …
Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards
has fascinated noteworthy consideration from numerous research communities. In this view …
has fascinated noteworthy consideration from numerous research communities. In this view …
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information
The channel state information (CSI) has been extensively studied in the literature to facilitate
authentication in wireless networks. The less focused is a systematic attack model to …
authentication in wireless networks. The less focused is a systematic attack model to …
Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging
Achieving information security in the Internet of things (IoT) by means of physical layer key
generation is an open research area. In the key generation, the secret key is generated …
generation is an open research area. In the key generation, the secret key is generated …
Optimal system performance in multihop energy harvesting WSNs using cooperative NOMA and friendly jammers
In this paper, we investigate the system performance of multihop energy harvesting (EH)
wireless sensor networks (WSNs) with imperfect channel state information (CSI) using …
wireless sensor networks (WSNs) with imperfect channel state information (CSI) using …
Physical layer security enhancement for Internet of Things in the presence of co-channel interference and multiple eavesdroppers
T Ssettumba, AH Abd El-Malek… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a multiuser system that utilizes transmit
antenna selection scheme at the base station and adopts threshold-based selection …
antenna selection scheme at the base station and adopts threshold-based selection …