Physical layer security in wireless networks: A tutorial

YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
… After we introduce the wireless communication model, we show some existing physical layer
… In this article, issues in physical layer security for wireless networks have been discussed in …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
… of physical layer security in multiuser wireless networks. The essential premise of physical
layer security is to enable the exchange of confidential messages over a wireless medium in …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
networks and analyze their impacts on IoT security. Then the physical-layer threats in 5G IoT
networks … to alleviate the physicallayer threats in 5G IoT networks, involving massive MIMO, …

Wireless physical layer security

HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
… in wireless data transmission. By using an information theoretic formalism, we have seen
that, in all of the principal channel models of wireless networking, the physical layer can in …

Physical layer key generation in wireless networks: challenges and opportunities

K Zeng - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels … This article provides an overview of the physical layer key generation process and dis…

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
physical layer security for future wireless networks, such as the joint physical-application
layer secure transmission design, the practical test bed design for physical layer security, etc. …

Safeguarding 5G wireless communication networks using physical layer security

N Yang, L Wang, G Geraci, M Elkashlan… - IEEE …, 2015 - ieeexplore.ieee.org
… increasing demands for future wireless applications, including an ultra-… wireless transmissions
are inherently vulnerable to security breaches. Specifically, we focus on physical layer

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… protocols, broadcasting nature of wireless channels makes it more vulnerable to … physical
layer technologies or cryptography. Here, our discussions focus mainly on their physical layer

Effects of wireless physical layer modeling in mobile ad hoc networks

M Takai, J Martin, R Bagrodia - … symposium on Mobile ad hoc networking …, 2001 - dl.acm.org
… interactions and identifies the modeling factors of the physical layer that make the most …
evaluation of wireless ad hoc routing protocols. The physical layer models considered in this …

Information and inference in the wireless physical layer

HV Poor - IEEE Wireless Communications, 2012 - ieeexplore.ieee.org
… ) in wireless network design. This article considers four physical layer wireless problems,
all of which are motivated by considerations in the application layer. Since the applications of …