Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… In the generic model of physical layer security problem, we usually have three main … In this
setup, Alice aims at sending secret data content and communicating confidentially with Bob in …

Physical layer security: a paradigm shift in data confidentiality

A Chorti, C Hollanti, JC Belfiore, HV Poor - Physical and data-link security …, 2015 - Springer
Physical layer security (PLS) draws on information theory to characterize the fundamental
ability of the wireless physical layer to ensure data confidentiality… and perfect secrecy of those …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… While physicallayer security encompasses both keyless secrecy and secretkey agreement
… on keyless security mechanisms. A brief review of the most common secure transmission …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
… the 5G securitysecurity protection may be achieved at the physical layer”. In this work, we
review how it is possible to move some of the security core functions down to the physical layer

Wireless physical layer security

HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
… In the following we will see that this imperfection of the communication channel can be
explicitly exploited to establish secrecy by physical layer methods without the need of a shared …

Physical layer security in wireless networks: A tutorial

YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
physical layer security approaches. A comparison of reliability, computational complexity,
and secrecy … In this article, issues in physical layer security for wireless networks have been …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
… and Maurer, aspects of secrecy at the physical layer have experienced a … of physical layer
security in modern wireless networks. The fundamental principle behind physical layer security

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
Confidentiality at the physical layer can generally be broken down into two different classes:
dissemination methods that secretly convey information using the properties of the wireless …

Safeguarding 5G wireless communication networks using physical layer security

N Yang, L Wang, G Geraci, M Elkashlan… - IEEE …, 2015 - ieeexplore.ieee.org
… Specifically, we focus on physical layer security, which safeguards data confidentiality by
exploiting the intrinsic randomness of the communications medium and reaping the benefits …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… have obtained precise secure degrees of freedom, ie, the behaviour of secrecy capacity in
… The secrecy sum capacity (as well as the secrecy capacity region) of the Gaussian MAC-WT …