Enabling secure wireless communications via intelligent reflecting surfaces

X Yu, D Xu, R Schober - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
In this paper, we propose to utilize intelligent reflecting surfaces (IRSs) for enhancing the
physical layer security of wireless communications systems. In particular, an IRS-assisted …

Security and eavesdropping in terahertz wireless links

J Ma, R Shrestha, J Adelberg, CY Yeh, Z Hossain… - Nature, 2018 - nature.com
Resiliency against eavesdropping and other security threats has become one of the key
design considerations for communication systems. As wireless systems become ubiquitous …

Cyber Attacks on OSI Layers: Understanding the Threat Landscape

AA Mughal - Journal of Humanities and Applied Science …, 2020 - journals.sagescience.org
Cyber attacks on the OSI layers are a growing concern, targeting various aspects of
communication networks and systems. Each layer of the OSI model is susceptible to specific …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions

A Li, D Spano, J Krivochiza… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Interference is traditionally viewed as a performance limiting factor in wireless
communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of …

Interplay between NOMA and other emerging technologies: A survey

M Vaezi, GAA Baduge, Y Liu, A Arafa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …

Robust transmission design for intelligent reflecting surface-aided secure communication systems with imperfect cascaded CSI

S Hong, C Pan, H Ren, K Wang… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the design of robust and secure transmission in intelligent
reflecting surface (IRS) aided wireless communication systems. In particular, a multi-antenna …