An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

K Ramezanpour, J Jagannath, A Jagannath - Computer Networks, 2023 - Elsevier
Spectrum scarcity has been a major concern for achieving the desired quality of experience
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Secure integrated sensing and communication

O Günlü, MR Bloch, RF Schaefer… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
This work considers the problem of mitigating information leakage between communication
and sensing in systems jointly performing both operations. Specifically, a discrete …

Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component

TC Gulcu, A Barg - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
The wiretap channel model of Wyner is one of the first communication models with both
reliability and security constraints. Capacity-achieving schemes for various models of the …

Short blocklength wiretap channel codes via deep learning: Design and performance evaluation

V Rana, RA Chou - IEEE Transactions on Communications, 2023 - ieeexplore.ieee.org
We design short blocklength codes for the Gaussian wiretap channel under information-
theoretic security guarantees. Our approach consists in decoupling the reliability and …

Transmitter actions for secure integrated sensing and communication

T Welling, O Günlü, A Yener - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
This work models a secure integrated sensing and communication (ISAC) system as a
wiretap channel with action-dependent channel states and channel output feedback, eg …

Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming

RA Chou, A Yener - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
We consider strongly secure communication over a discrete memoryless multiple access
wiretap channel with two transmitters. No degradation or symmetry assumptions are made …