What physical layer security can do for 6G security

M Mitev, A Chorti, HV Poor… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
data confidentiality and data privacy. In detail, the information theoretic formulations of these
problems will be investigated. As noted in Section I, confidential dataphysical layer security

Physical layer security with its applications in 5G networks: A review

L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
… that, to guarantee the user’s data confidentiality, the allocated power does not only depend
secrecy throughput of on-off secure transmission in the case that only stale CSI is available. …

[HTML][HTML] The role of physical layer security in IoT: A novel perspective

T Pecorella, L Brilli, L Mucchi - Information, 2016 - mdpi.com
privacy and to supplement upper-layer security algorithms. The application of physical layer
security … In physical layer security for wireless networks, the secrecy rate is defined as the …

A physical-layer security scheme by phase-based adaptive modulation

S Althunibat, V Sucasas… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… a physical-layer security scheme that adapts the modulation type based on the channel phase
in order to secure the transmitted data. … Thus, aiming at improving the confidentiality of the …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… Moreover, physical layer key (PHY-key) generation is emerging as a promising confidential
technique, which exploits physical layer random characteristics to share secret keys. These …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
security framework. We conclude by outlining the future challenges in applying these compelling
physical layer security … , given the confidential nature of IoT data. We have conceived a …

Context-aware security for 6G wireless: The role of physical layer security

A Chorti, AN Barreto, S Köpsell, M Zoli… - IEEE …, 2022 - ieeexplore.ieee.org
… delay-constrained URLLC systems remain, with respect not only to authentication, but also
for the integrity and confidentiality of both the control and data planes, as documented in [2]. …

Physical-layer security for MISO visible light communication channels

A Mostafa, L Lampe - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
… In this paper, we consider enhancing the confidentiality of VLC links via physical-layer security
techniques. In particular, we are interested in characterizing the secrecy rates achievable …

Physical-layer security in 6G networks

L Mucchi, S Jayousi, S Caputo… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
… area networks, and physical layer security is one candidate to handle the confidentiality of in-
… and applications of physical layer security techniques for confidentiality: A comprehensive …

Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures

SN Islam, Z Baig, S Zeadally - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
… depends on the privacy, integrity, and availability of energy data. Thus, it is essential to
protect energy system data from potential security threats ranging from privacy breaches to …