An overview of key technologies in physical layer security

A Sanenga, GA Mapunda, TML Jacob, L Marata… - Entropy, 2020 - mdpi.com
The open nature of radio propagation enables ubiquitous wireless communication. This
allows for seamless data transmission. However, unauthorized users may pose a threat to …

Physical layer security in downlink multi-antenna cellular networks

G Geraci, HS Dhillon, JG Andrews… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, we study physical layer security for the downlink of cellular networks, where
the confidential messages transmitted to each mobile user can be eavesdropped by both; 1) …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

Artificial noise assisted secure interference networks with wireless power transfer

N Zhao, Y Cao, FR Yu, Y Chen, M Jin… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Interference alignment (IA) is a remarkable technique to manage interference, and artificial
noise (AN) can be utilized to combat one main threat of security, passive eavesdropping …

On Physical Layer Security Over the Fisher-Snedecor Wiretap Fading Channels

L Kong, G Kaddoum - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we initially investigate the physical layer security over device-to-device
communications, where the channel is modeled from the Fisher-Snedecor. T distribution. To …

Security-reliability trade-off analysis for multiuser SIMO mixed RF/FSO relay networks with opportunistic user scheduling

AH Abd El-Malek, AM Salhab… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we study the performance of multiuser single-input multiple-output mixed radio
frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling …

Analysis of augmentation methods for RF fingerprinting under impaired channels

C Comert, M Kulhandjian, OM Gul, A Touazi… - Proceedings of the …, 2022 - dl.acm.org
Cyber-physical systems such as autonomous vehicle networks are considered to be critical
infrastructures in various applications. However, their mission critical deployment makes …

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …

Switched phased-array transmission architecture for secure millimeter-wave wireless communication

NN Alotaibi, KA Hamdi - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a new wireless communication transmission architecture called
switched phased-array (SPA), to enhance physical layer security. SPA works as a platform …