D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… In contrast to existing surveys, our work tries to review the recent advances in physical layer security from the perspective of system optimization and design. First, we summarize the …
… must be carefully analyzed in order to prevent security and … security framework for the device initialization and we will show how physicallayersecurity can effectively boost the security …
… Physicallayersecurity (PLS) has been identified as one of the promising security … between the sender and the receiver in the physicallayer. We start by introducing the basic theories of …
S Zhang, J Peng, K Huang, X Xu… - 2017 9th International …, 2017 - ieeexplore.ieee.org
… Fortunately, physicallayersecurity (PLS) has emerged as an appealing approach to … secure on-off scheme [5]. However, the majority of the existing works on the physicallayersecurity …
… physicallayersecurity research. This paper provides a latest survey of the physicallayer security research on various promising 5G technologies, including physicallayersecurity …
… To achieve this favorable solution, however, the resource management for D2D communication has to be redesigned from the physicallayersecurityperspective, which is the goal of …
… From a practical perspective, the design of physical-layer encryption schemes from correlated channel observations turns out to be a simpler problem than the construction of codes for …
… We begin with one-to-many broadcast channels (BCs), which can be divided into two major categories from a securityperspective: 1) BC with confidential messages: each downlink …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… technique, which exploits physicallayer random characteristics to … perspective of security theory, confidentiality and authentication in physicallayer constitute a prototype of PHY-security…