Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Polarization modulation for wireless communications based on metasurfaces

CX Huang, J Zhang, Q Cheng… - Advanced Functional …, 2021 - Wiley Online Library
As an alternative to conventional wireless communication techniques that use amplitude,
frequency, and phase modulations, polarization modulation (PoM) provides an additional …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

Quaternion Fourier transform on quaternion fields and generalizations

EMS Hitzer - Advances in Applied Clifford Algebras, 2007 - Springer
We treat the quaternionic Fourier transform (QFT) applied to quaternion fields and
investigate QFT properties useful for applications. Different forms of the QFT lead us to …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

First-and second-order asymptotics in covert communication

M Tahmasbi, MR Bloch - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study the first-and second-order asymptotics of covert communication over binary-input
discrete memoryless channels for three different covertness metrics and under maximum …

Cooperative authentication in underwater acoustic sensor networks

R Diamant, P Casari, S Tomasin - IEEE transactions on …, 2018 - ieeexplore.ieee.org
With the growing use of underwater acoustic communications (UWAC) for both industrial
and military operations, there is a need to ensure communication security. A particular …

Physical layer node authentication in underwater acoustic sensor networks using time-reversal

R Zhao, M Khalid, OA Dobre, X Wang - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) have played a vital role in many security-
sensitive applications like offshore oil exploration, tsunami forecast, and tactical …