Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook

W Aman, S Al-Kuwari, M Muzzammil, MMU Rahman… - Ad Hoc Networks, 2023 - Elsevier
The technologies used in underwater and air–water (A–W) wireless communication
networks (WCN) are increasingly attracting attention due to numerous modern applications …

Securing NextG networks with physical-layer key generation: A survey

Q Xiao, J Zhao, S Feng, G Li, A Hu - Security and Safety, 2024 - sands.edpsciences.org
As the development of next-generation (NextG) communication networks continues,
tremendous devices are accessing the network and the amount of information is exploding …

Underwater and Air-Water Wireless Communication: State-of-the-art, Channel Characteristics, Security, and Open Problems

W Aman, S Al-Kuwari, A Kumar, MMU Rahman… - arXiv preprint arXiv …, 2022 - arxiv.org
We present a first detailed survey on underwater and air-water (AW) wireless
communication networks (WCNs) that mainly focuses on the security challenges and the …

Securing the inter-spacecraft links: Physical layer key generation from Doppler frequency shift

OA Topal, GK Kurt… - IEEE Journal of Radio …, 2021 - ieeexplore.ieee.org
In this work, we propose a secret key generation procedure specifically designed for the
inter-spacecraft communication links. As a novel secrecy source, the spacecrafts utilize …

[PDF][PDF] 基于旋转置乱的索引跳频抗干扰加密方法

鲁信金, 雷菁, 施育鑫 - Journal on Communications, 2021 - researchgate.net
为了提升无线通信系统的抗干扰能力和安全性, 设计了一种基于旋转置乱的索引跳频抗干扰加密
方法, 简称加密的索引跳频(EIM-FHSS) 方法. 首先, 通过无线密钥产生多路正交的跳频图案确定 …

Maximizing secrecy rate of an orthogonal frequency division multiplexing‐based multihop underwater acoustic sensor network

W Aman, MMU Rahman, Z Haider… - Transactions on …, 2020 - Wiley Online Library
In this article, we consider an eavesdropping attack on a multihop, underwater acoustic
sensor network that consists of M+ 1 underwater sensors which report their sensed data via …

Physical layer data analysis for abnormal user detecting: a random matrix theory perspective

H Chen, X Tao, N Li, S Xia, T Sui - IEEE Access, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) is a promising technology to enhance security performance of
wireless communication systems, while the analyzing of PLS abnormal user detection is an …

[PDF][PDF] Security of underwater and air-water wireless communication

W Aman, S Al-Kuwari, A Kumar… - arXiv preprint arXiv …, 2022 - academia.edu
We present a first detailed survey that focuses on the security challenges faced by the
underwater and air-water (AW) wireless communication networks (WCNs), as well as the …

Common Randomness Generation for Information Theoretic Security in Post-Quantum Internet of Things

PKH Sheshagiri, S Das, JA Cabrera… - 2023 IEEE 9th World …, 2023 - ieeexplore.ieee.org
With rapid advances made in quantum computing, information theoretic security is of
paramount importance for Internet of Things (IoT), particularly for low-powered devices like …

Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling.

LU Xinjin, LEI Jing, SHI Yuxin - Journal on Communication …, 2022 - search.ebscohost.com
In order to improve the anti-jamming ability and security of the wireless communication
system, an index frequency-hopping anti-interference encryption method based on rotation …