CD-PHY: Physical layer security in wireless networks through constellation diversity

MI Husain, S Mahant, R Sridhar - MILCOM 2012-2012 IEEE …, 2012 - ieeexplore.ieee.org
A common approach for introducing security at the physical layer is to rely on the channel
variations of the wireless environment. This type of approach is not always suitable for …

A practical implementation of physical layer security in wireless networks

SA Hoseini, F Bouhafs… - 2022 IEEE 19th Annual …, 2022 - ieeexplore.ieee.org
Physical Layer Security (PLS) is widely recognized as a promising approach to secure
wireless communications through the exploitation of the physical properties of the wireless …

Enhanced physical layer security through transmit antenna selection

H Alves, RD Souza, M Debbah - 2011 IEEE GLOBECOM …, 2011 - ieeexplore.ieee.org
We analyze the physical layer security of a communication scheme with a multiple antenna
legitimate transmitter, employing transmit antenna selection (TAS), and a single antenna …

Performance of transmit antenna selection physical layer security schemes

H Alves, RD Souza, M Debbah… - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
We analyze the physical layer (PHY) security of a communication scheme consisting of a
multiple antenna transmitter with a single radio frequency (RF) chain using transmit antenna …

Shout to secure: Physical-layer wireless security with known interference

ML Jorgensen, BR Yanakiev… - … 2007-IEEE Global …, 2007 - ieeexplore.ieee.org
This paper proposes a physical-layer security scheme for wireless networks, aiming to
achieve communication secrecy by making the eavesdropper incapable of decoding the …

Physical layer security improvement by constellation selection and artificial interference

D Xu, P Ren, Q Du, L Sun… - 2017 IEEE Wireless …, 2017 - ieeexplore.ieee.org
We propose a novel physical layer scheme to suppress eavesdropping. Different from the
existing schemes which are based on secrecy rate enhancement with Gaussian signal, our …

Wireless physical layer security using channel state information

M Tahir, SPW Jarot, MU Siddiqi - International Conference on …, 2010 - ieeexplore.ieee.org
In this paper we consider the problem of secure communication between two nodes, over a
fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme …

Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication

X Wang, M Waqas, S Tu, S Ur Rehman… - IET …, 2020 - Wiley Online Library
The intrinsic broadcast nature of wireless communication let the attackers to initiate several
passive attacks such as eavesdropping. In this attack, the attackers do not disturb/stop or …

Physical-layer security in the finite blocklength regime over fading channels

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper studies physical-layer secure transmissions from a transmitter to a legitimate
receiver against an eavesdropper over slow fading channels, taking into account the impact …

Enhancing wireless secrecy via cooperation: Signal design and optimization

HM Wang, XG Xia - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Physical layer security, or information-theoretic security, has attracted considerable attention
recently, due to its potential to enhance the transmission secrecy of wireless …