Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey on STAR-RIS: Use cases, recent advances, and future research challenges

M Ahmed, A Wahid, SS Laique… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The recent development of metasurfaces, which may enable several use cases by modifying
the propagation environment, is anticipated to substantially affect the performance of sixth …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …

Enhancing secure MIMO transmission via intelligent reflecting surface

L Dong, HM Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
In this article, we consider an intelligent reflecting surface (IRS) assisted Guassian multiple-
input multiple-output (MIMO) wiretap channel (WTC), and focus on enhancing its secrecy …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …