Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… at the physical layer, which efficiently provide building blocks for confidential and authenticated
data … To this end, there is a need to strengthen the protocols at the physical layer to brace …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
… The goal of physical layer security (PLS) is to make use of the properties of the physical layer
employed to provide (a) node authentication, (b) message authentication, and (c) message …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
… to imperfections in the manufacturing process on the different … to this, authentication can be
ensured at the PHY layer relying … Such a framework, aka physical layer authentication (PLA), …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… In the generic model of physical layer security problem, we usually have three main … [114]
developed an array processing based directional modulation technique that not only …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… -layer processing, which significantly saves both computational complexity and processing
delay. … The PLS provides a confidential transmission by exploiting the physical-layer features …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
… and signal processing to secure physical layer systems. … physical layer can support
confidentiality and authentication, … that must be addressed if physical layer security is ever to be …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… Explicitly, the process of differentiating and measuring the fingerprints of … confidential nature
of IoT data. We have conceived a physical layer security-based framework for authentication

Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]

S Mathur, A Reznik, C Ye, R Mukherjee… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
layer approach that uses physical layer information to enhance encryption and authentication
… bits extracted from the physical layer channel into the key establishment process, it is possi…

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… Recently, the research has been extended to authentication [… rity theory, confidentiality and
authentication in physical layer … to signal processing technologies of PHY-security, we devise …

Physical layer authentication in wireless networks-based machine learning approaches

L Alhoraibi, D Alghazzawi, R Alhebshi, OBJ Rabie - Sensors, 2023 - mdpi.com
processing, and physical layer key generation to physical … the most targeted studies the
physical layer confidentiality is to … channel, which is defined as the secrecy capacity by Wyner [41]…