Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Communications in the 6G era

H Viswanathan, PE Mogensen - IEEE access, 2020 - ieeexplore.ieee.org
The focus of wireless research is increasingly shifting toward 6G as 5G deployments get
underway. At this juncture, it is essential to establish a vision of future communications to …

Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms

YK Saheed, MO Arowolo - IEEE Access, 2021 - ieeexplore.ieee.org
Information and communication technology (ICT) advancements have altered the entire
computing paradigm. As a result of these improvements, numerous new channels of …

An intrusion detection system for internet of medical things

G Thamilarasu, A Odesile, A Hoang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is making strong advances in healthcare with the promise of
transformation in technological, social and economic prospects, paving the way for a healthy …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks

IA Khan, N Moustafa, I Razzak, M Tanveer, D Pi… - Future generation …, 2022 - Elsevier
Abstract The Internet of Medical Things (IoMT) is increasingly replacing the traditional
healthcare systems. However, less focus has been paid to their security against cyber …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …