Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol

D Chen, N Zhang, Z Qin, X Mao, Z Qin… - IEEE Internet of …, 2016 - ieeexplore.ieee.org
Device authentication is a critical and challenging issue for the emerging Internet of Things
(IoT). One promising solution to authenticate IoT devices is to extract a fingerprint to perform …

Intelligent reflecting surface assisted secret key generation

X Lu, J Lei, Y Shi, W Li - IEEE Signal Processing Letters, 2021 - ieeexplore.ieee.org
In secret key generation of physical layer security technology, it is challenging to achieve
high key capacity and low bit inconsistency rate. This paper investigates intelligent reflecting …

LoRa-key: Secure key generation system for LoRa-based network

W Xu, S Jha, W Hu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

PCP: A privacy-preserving content-based publish–subscribe scheme with differential privacy in fog computing

Q Wang, D Chen, N Zhang, Z Ding, Z Qin - IEEE Access, 2017 - ieeexplore.ieee.org
Fog computing dramatically extends the cloud computing to the edge of the network and
admirably solves the problem that the brokers (in publish-subscribe system) generally lack …