Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
security framework. We conclude by outlining the future challenges in applying these compelling
physical layer security … , given the confidential nature of IoT data. We have conceived a …

Physical layer security in UAV systems: Challenges and opportunities

X Sun, DWK Ng, Z Ding, Y Xu… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… Moreover, by using advanced resource allocation techniques, the secrecy performance can
be further improved. In the following, we discuss the specific effective physical layer security

Physical-layer security in space information networks: A survey

B Li, Z Fei, C Zhou, Y Zhang - IEEE Internet of things journal, 2019 - ieeexplore.ieee.org
… Therefore, privacy and security concerns in such communication networks have been
caught in the spotlight of attention. Typically, there are two types of approaches to protect the …

Physical layer security for visible light communication systems: A survey

MA Arfaoui, MD Soltani, I Tavakkolnia… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… the secrecy … , physicallayer key generation and secure coding. The authors in [43] reviewed
different jamming techniques, employed in the literature, that aim at improving the secrecy

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
… communication security in 5G IoT networks, physical layer security (… the security threats from
the 5G IoT physical layer and … ’s modern life, the security and privacy of 5G IoT wireless net…

Intelligent reflecting surface: A programmable wireless environment for physical layer security

J Chen, YC Liang, Y Pei, H Guo - IEEE Access, 2019 - ieeexplore.ieee.org
… By jointly optimizing the beamformers at the BS and reflecting coefficients at the IRS, we
formulate a minimum-secrecy-rate maximization problem under various practical constraints on …

Safeguarding wireless network with UAVs: A physical layer security perspective

Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
… 5b, we plot the achievable secrecy rates in bits per second per Hertz by different schemes
vs. the UAV-BS transmit power, PU. First, it is observed that compared to hovering at the fixed …

[PDF][PDF] A survey on future generation wireless communications-5G: multiple access techniques, physical layer security, beamforming approach

KK Vaigandla, DN Venu - Journal of Information and …, 2021 - researchgate.net
physical layer security in several enabling technologies for 5G and the physical layer security
… Power control topologies maximize the attainable rate of sum secrecy. Massive MIMO can …

Physical layer secret key generation in static environments

N Aldaghri, H Mahdavifar - … Information Forensics and Security, 2020 - ieeexplore.ieee.org
… cryptographic schemes, physical layer security methods can … key generation protocols at the
physical layer. The setup for the … Then, they use privacy amplification to improve the security

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… Besides the physical layer provides a promising authenti… security techniques, eg, the
Physical Layer Security (PLS) and … a confidential transmission by exploiting the physical-layer