Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities

M de Ree, G Mantas, J Rodriguez… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
… of physical-layer security (PLS). Finally, we provide an overview of PLS schemes which aim
to enhance data confidentiality … the capabilities and limitations of physicallayer security (PLS) …

An overview of key technologies in physical layer security

A Sanenga, GA Mapunda, TML Jacob, L Marata… - Entropy, 2020 - mdpi.com
… The secrecy metrics from information-theoretic security are well-established and have
laid the foundation of secrecy coding in the physical layer. However, they are challenging to …

A survey on OFDM physical layer security

R Melki, HN Noura, MM Mansour, A Chehab - Physical Communication, 2019 - Elsevier
security vulnerabilities, physical layer security (PLS) has been recently introduced as a promising
candidate to ensure the security of … , data confidentiality is information/data secrecy. It is …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… on physical layer security mainly focuses either on the secrecy … , physical layer security
presents distinctive advantages and promising prospects. Therefore, the physical layer security

Coding for secrecy: An overview of error-control coding techniques for physical-layer security

WK Harrison, J Almeida, MR Bloch… - IEEE Signal …, 2013 - ieeexplore.ieee.org
… A wide range of techniques can be employed to secure communications at the physical layer
… “Secrecy Metrics,” we discuss several common security constraints that are used in secrecy

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
… Recently, significant efforts have been made to pave the way for the integration of physical
layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its …

A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
… [30] combined secure beamforming with cooperative jamming to enhance the physical layer
security. … to minimize the secrecy outage probability subject to the secrecy rate requirement. …

Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… Both physicallayer security primitives rely on the properties of … , confidentiality and authenticity
are two security goals which … even though the main physical-layer operation required is …

An overview and future directions on physical-layer security for cognitive radio networks

DH Tashman, W Hamouda - IEEE Network, 2020 - ieeexplore.ieee.org
… approach to achieve the required level of secrecy. In this article, we present an overview
of the physical-layer security for CRNs. Certain threats over the physical layer of the CRN are …

Physical-layer security in evolving optical networks

N Skorin-Kapov, M Furdek, S Zsigmond… - IEEE …, 2016 - ieeexplore.ieee.org
Physical-layer technologies proposed for further security enhancements in protecting user
data confidentiality include secure communications using optical chaos (SCOC), optical code-…