Secure short-packet communications at the physical layer for 5G and beyond

C Feng, HM Wang - IEEE Communications Standards …, 2021 - ieeexplore.ieee.org
… encryption mechanism cannot fully address the security challenge considering the resource
secure short-packet communication from the perspective of physical layer security (PLS), …

Physical layer security with its applications in 5G networks: A review

L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
… in the decoding set with an un-decoded source packet … source packet from the received FC
packet. However, for the eavesdropper, no source packets can be recovered once any packet

NOMA-assisted secure short-packet communications in IoT

Z Xiang, W Yang, Y Cai, Z Ding… - … Communications, 2020 - ieeexplore.ieee.org
… is exploited to secure short-packet communications in IoT networks … secure transmission.
Simulation results show that secrecy performance deteriorates in short-packet communications, …

Reliable and secure short-packet communications

C Feng, HM Wang, HV Poor - … on Wireless Communications, 2021 - ieeexplore.ieee.org
… (mMTC) and ultra-reliable low-latency communications (uRLLC). In this paper, we
investigate short-packet communications to provide both reliability and security guarantees …

Securing wireless communications of the internet of things from the physical layer, an overview

J Zhang, TQ Duong, R Woods, A Marshall - Entropy, 2017 - mdpi.com
… This section introduces some recent ongoing encryption schemes implemented at the
physical layer, which protects the entire physical layer packet. PLE schemes are lightweight as …

Secure short-packet communications for mission-critical IoT applications

HM Wang, Q Yang, Z Ding… - … Wireless Communications, 2019 - ieeexplore.ieee.org
communications; however, the incurred security issues and the impact of finite blocklength
coding on the physical-layer security … performance of secure short-packet communications in …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
security at perception layer followed by IoT security requirements. Secondly, after describing
the generic IoT-layered securitylayer. We categorize and classify various attacks at different …

Security at the Internet layer

R Oppliger - Computer, 1998 - ieeexplore.ieee.org
… higher layer security protocols for end-to-end communication security.In the near future,
however, … A security association either affords each packet IPsec security services, discards it, or …

Joint physical-application layer security for wireless multimedia delivery

L Zhou, D Wu, B Zheng… - IEEE Communications …, 2014 - ieeexplore.ieee.org
layer security technologies. Subsequently, a joint physical-application layer security … is
reduced dramatically, since only one application packet is processed in each block. 3.The …

Self-organized network-layer security in mobile ad hoc networks

H Yang, X Meng, S Lu - … of the 1st ACM workshop on Wireless security, 2002 - dl.acm.org
… Our fundamental goal is to provide a coherent, unified network-layer security solution to
protect both the routing and packet forwarding functionalities in ad hoc networks. Although it is …