Context-aware security for 6G wireless: The role of physical layer security

A Chorti, AN Barreto, S Köpsell, M Zoli… - IEEE …, 2022 - ieeexplore.ieee.org
… delay-constrained URLLC systems remain, with respect not only to authentication, but also
for the integrity and confidentiality of both the control and data planes, as documented in [2]. …

Physical layer security for visible light communication systems: A survey

MA Arfaoui, MD Soltani, I Tavakkolnia… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… the secrecy … , physicallayer key generation and secure coding. The authors in [43] reviewed
different jamming techniques, employed in the literature, that aim at improving the secrecy

Reconfigurable intelligent surface for physical layer security in 6G-IoT: Designs, issues, and advances

W Khalid, MAU Rehman, T Van Chien… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
security risks because confidential information is transmitted over wireless … Physical layer
security (PLS) exploits the dynamic characteristics of wireless environments to provide secure

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - … and Security, 2020 - ieeexplore.ieee.org
… beamforming strategy to protect the transmission of confidential information. Unlike [15], a
… aided secrecy beamforming scheme was proposed to improve the physical layer security for …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… Besides the physical layer provides a promising authenti… security techniques, eg, the
Physical Layer Security (PLS) and … a confidential transmission by exploiting the physical-layer

Physical layer secret key generation in static environments

N Aldaghri, H Mahdavifar - … Information Forensics and Security, 2020 - ieeexplore.ieee.org
… cryptographic schemes, physical layer security methods can … key generation protocols at the
physical layer. The setup for the … Then, they use privacy amplification to improve the security

Physical layer security enhancement exploiting intelligent reflecting surface

K Feng, X Li, Y Han, S Jin… - IEEE Communications …, 2020 - ieeexplore.ieee.org
In this letter, the use of intelligent reflecting surface (IRS) to enhance the physical layer
security of downlink wireless communication is investigated. Assuming a single-antenna …

Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things

X Li, Y Zheng, WU Khan, M Zeng, D Li… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… To solve this problem, physical layer security (PLS) has been proposed from an information-…
achievable secrecy rate constraints. However, [48] did not consider the secure performance …

6G white paper: Research challenges for trust, security and privacy

M Ylianttila, R Kantola, A Gurtov, L Mucchi… - arXiv preprint arXiv …, 2020 - arxiv.org
… This chapter discusses about the challenges, solutions and visions of physicallayer security
in beyond-5G systems from several aspects. Section 3.1 discusses the vision of PhySec over …

A survey of IoT security based on a layered architecture of sensing and data analysis

H Mrabet, S Belguith, A Alhomoud, A Jemai - Sensors, 2020 - mdpi.com
… As shown in Figure 1, the physical layer involves different … through widespread SSL and
transport layer security (TLS) protocols… communication to ensure data confidentiality and privacy. …