Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey

H Sharma, N Kumar - Physical Communication, 2023 - Elsevier
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services

JM Hamamreh, E Basar, H Arslan - IEEE Access, 2017 - ieeexplore.ieee.org
An efficient physical layer security technique, referred to as OFDM with subcarrier index
selection (OFDM-SIS), is proposed for safeguarding the transmission of OFDM-based …

Deep-learning-based physical layer authentication for industrial wireless sensor networks

RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F Xie… - sensors, 2019 - mdpi.com
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer
authentication takes advantages of channel impulse response from wireless propagation to …

Remote state estimation in the presence of an active eavesdropper

K Ding, X Ren, AS Leong… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider remote state estimation in the presence of an active eavesdropper. A sensor
forward local state estimates to a remote estimator over a network, which may be …

A learning approach for physical layer authentication using adaptive neural network

X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
In communications, innovative paradigm shifts have emerged in integrating various devices
into the network to provide advanced and intelligent services. However, various security …

Multiuser physical-layer authentication based on latent perturbed neural networks for industrial internet of things

R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, learning (DL)-based physical-layer authentication (PLA) has attracted much
attention since artificial neural networks (ANNs) can be built to extract useful features from …

Learning-based PHY-layer authentication for underwater sensor networks

L Xiao, G Sheng, X Wan, W Su… - IEEE communications …, 2018 - ieeexplore.ieee.org
In this letter, we propose a physical (PHY)-layer authentication framework to detect spoofing
attacks in underwater sensor networks. This scheme exploits the power delay profile of the …