CD-PHY: Physical layer security in wireless networks through constellation diversity

MI Husain, S Mahant, R Sridhar - MILCOM 2012-2012 IEEE …, 2012 - ieeexplore.ieee.org
… For these scenarios, a channel independent physical layer security technique is … CD-PHY,
a physical layer security technique that exploits the constellation diversity of wireless networks

Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks

R Zhang, X Cheng, L Yang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
cellular communication link and one D2D pair cannot access multiple RBs. In this paper, we
… the physical layer security issue in D2D communications underlaying cellular networks from …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
… As there is no interference from other wireless networks inside the anechoic chamber, the
channel remains the same in the static scenario. Therefore, the variation of the received signal …

Internet of Things and wireless physical layer security: A survey

A Soni, R Upadhyay, A Jain - … , Networking and Internet Security …, 2017 - Springer
security which is a critical concern in wireless network and so in IoT [2]. Physical layer security
(PLS) is the primary security … the physical (PHY) layer properties of the wireless channels …

Machine learning-based physical layer security: techniques, open challenges, and applications

AK Kamboj, P Jindal, P Verma - Wireless Networks, 2021 - Springer
… emerging wireless networks demands some new security schemes [3]. Wireless physical
layer security is a promising solution to address the aforementioned security issues of classical …

Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection

S Atapattu, N Ross, Y Jing, Y He… - … on Wireless …, 2019 - ieeexplore.ieee.org
… To enhance the physical-layer security, within a given coherence time, our objective is to
jointly assign the available relays at each hop to different SD pairs to maximize the minimum …

Adaptive base station cooperation for physical layer security in two-cell wireless networks

L Hu, H Wen, B Wu, J Tang, F Pan - IEEE Access, 2016 - ieeexplore.ieee.org
… Abstract—We study physical layer security in two-cell wireless networks in which a base
station (Alice) intends to send a confidential message to a legitimate user (Bob) with the help of …

Securing wireless communications of the internet of things from the physical layer, an overview

J Zhang, TQ Duong, R Woods, A Marshall - Entropy, 2017 - mdpi.com
… IoT wireless security. Future research to make IoT-based physical layer security more robust
… to combat the interference from other wireless networks running at the ISM bands. It has …

On the physical layer security of backscatter wireless systems

W Saad, X Zhou, Z Han, HV Poor - … transactions on wireless …, 2014 - ieeexplore.ieee.org
physical layer techniques in backscatter systems. In this paper, the physical layer security of
wireless … Other mobile network applications of physical layer security are studied in [34] and […

Improve physical layer security in cooperative wireless network using distributed auction games

R Zhang, L Song, Z Han, B Jiao - 2011 IEEE Conference on …, 2011 - ieeexplore.ieee.org
wireless networks with jammers, the network performance of physical layer security … In
this paper, we investigate how to improve physical layer security in a cooperative scenario…