Hardware Efficient Architectural Design for Physical Layer Security in Wireless Communication

R Pradeep, R Kanimozhi - Wireless Personal Communications, 2021 - Springer
The Wireless communication technology is an integral part of our day to day life. Since it is
developed, secured transmission, error rate, energy, speed and cost of execution are the …

Physically secure sub-THz wireless links

K Sengupta, X Lu, S Venkatesh… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Ensuring security is emerging as one of the grand challenges towards realization of a large-
scale and high-speed wireless network fabric for 5G and beyond. In particular, enabling …

Analysis and application of endogenous wireless security principle for key generation

X Wang, L Jin, Y Lou, X Xu - China Communications, 2021 - ieeexplore.ieee.org
The open and broadcast nature of wireless channels leads to the inherent security problem
of information leakage in wireless communication. We can utilize endogenous security …

Spatio-temporal modulated mm-wave arrays for physical layer security and resiliency against distributed eavesdropper attacks

S Venkatesh, X Lu, K Sengupta - Proceedings of the 5th ACM Workshop …, 2021 - dl.acm.org
Ensuring security for the next-generation of millimeter-Wave and Terahertz networks, while
simultaneously ensuring multi-Gbps data rates and ultra-low latency (sub-millisecond) is …

Deploying an OFDM physical layer security with high rate data for 5G wireless networks

S Komeylian, S Komeylian - 2020 IEEE Canadian conference …, 2020 - ieeexplore.ieee.org
Open nature of wireless networks leads to being sensitive to eavesdropping. Hence, a
tremendous growth of literature has carried out challenges in privacy and security in …

Physical layer security in hybrid satellite-terrestrial relay networks

V Bankey, PK Upadhyay, DB Costa - Physical Layer Security, 2021 - Springer
Featured by broad coverage and seamless connectivity in remote areas, hybrid satellite-
terrestrial relay networks (HSTRNs) have gained growing attention in fifth-and next …

Achievable secrecy rate region for buffer-aided multiuser MISO systems

X Lan, J Ren, Q Chen, L Cai - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider a buffer-aided multiuser multiple-input single-output (MISO)
network consisting of one multi-antenna access point (AP) and multiple single-antenna …

UAV Traffic Management: A Survey On Communication Security

R Aissaoui, JC Deneuville, C Guerber… - arXiv preprint arXiv …, 2022 - arxiv.org
Unmanned Aerial Systems (UAS) have a wide variety of applications, and their development
in terms of capabilities is continuously evolving. Many missions performed by an Unmanned …

Satellite quantum communications when man-in-the-middle attacks are excluded

T Vergoossen, R Bedington, JA Grieve, A Ling - Entropy, 2019 - mdpi.com
An application of quantum communications is the transmission of qubits to create shared
symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to …

Secure short-packet transmission in uplink massive MU-MIMO IoT networks

T Yu, X Sun, Y Cai - 2020 International Conference on Wireless …, 2020 - ieeexplore.ieee.org
In this paper, we investigate a massive multiuser multiple-input-multiple-output (MU-MIMO)
system consisting of one base station (BS) equipped with multiple-antenna, one …