Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

On secrecy metrics for physical layer security over quasi-static fading channels

B He, X Zhou, AL Swindlehurst - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Theoretical studies on physical layer security often adopt the secrecy outage probability as
the performance metric for wireless communications over quasi-static fading channels. The …

A review on physical layer security techniques for 5G

REN Pin-yi, T Xiao - Journal of Beijing University of Posts and …, 2018 - journal.bupt.edu.cn
Physical layer security techniques exploit the inherent randomness of wireless medium for
information security, but which has been significantly challenged by the rapid development …

Optimising multiple antenna techniques for physical layer security

LN Romero Zurita - 2014 - etheses.whiterose.ac.uk
Wireless communications offer data transmission services anywhere and anytime, but with
the inevitable cost of introducing major security vulnerabilities. Indeed, an eavesdropper can …

Advances and Challenges in Physical Layer Security: A Comprehensive Review

N Zhang, Y Ai, D Zhang, Y Liang… - 2023 International …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a promising approach to enhance the security
of wireless communication systems. This paper provides a comprehensive review of PLS …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Performance of transmit antenna selection physical layer security schemes

H Alves, RD Souza, M Debbah… - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
We analyze the physical layer (PHY) security of a communication scheme consisting of a
multiple antenna transmitter with a single radio frequency (RF) chain using transmit antenna …

A SKG security challenge: Indoor SKG under an on-the-shoulder eavesdropping attack

A Mayya, M Mitev, A Chorti… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness
in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies …

Secrecy rate region enhancement in multiple access wiretap channel

SM Shah - Journal of Telecommunications and Information …, 2022 - yadda.icm.edu.pl
It is commonly known that physical layer security is achieved with a trade-off in terms of the
achievable rate. Hence, security constraints generate rate losses in wiretap channels. To …

Receiver Design and Security for Low Power Wireless Communications Systems

KA Morrison - 2014 - scholarworks.umass.edu
This dissertation focuses on two important areas in wireless communications: receiver
design and security. In the first part of this dissertation we consider low data rate receiver …