Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …

Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Physical layer security in 5G based large scale social networks: Opportunities and challenges

Y Gao, S Hu, W Tang, Y Li, Y Sun, D Huang… - IEEE …, 2018 - ieeexplore.ieee.org
The increasing demand in 5G wireless systems has brought significant improvement in
transmission speed with lower latency, especially in ultra-dense networks. The demand of …

Secure Transmission for Uplink SCMA Systems Over - Fading Channels

HRC Mora, NVO Garzón, FDA García… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Sparse code multiple access (SCMA) is an interesting proposal for supporting massive
machine-type communications (mMTC) in future mobile networks. In this use case, mobile …

Chaotic-enabled phase modulation in time-modulated arrays for secure transmission

H Li, Y Chen, S Yang - IEEE Transactions on Antennas and …, 2022 - ieeexplore.ieee.org
The “time” factor in time-modulated arrays (TMAs) offers a new degree of freedom for
securing wireless communication. However, the widely used periodic time modulation …

PLS-IoT enhancement against eavesdropping via spatially distributed constellation obfuscation

H Salman, H Arslan - IEEE Wireless Communications Letters, 2023 - ieeexplore.ieee.org
Wireless communication has become a ubiquitous facet of modern-day life. With the advent
of Internet of Things (IoT) and massive machine-type connectivity, the number of devices is …

Secure transmission with randomized constellation rotation for downlink sparse code multiple access system

K Lai, J Lei, L Wen, G Chen, W Li, P Xiao - IEEE Access, 2017 - ieeexplore.ieee.org
Sparse code multiple access (SCMA) is a promising candidate air interface of next-
generation mobile networks. In this paper, we focus on a downlink SCMA system where a …

Efficient physical layer key generation technique in wireless communications

R Lin, L Xu, H Fang, C Huang - EURASIP Journal on Wireless …, 2020 - Springer
Wireless communications between two devices can be protected by secret keys. However,
existing key generation schemes suffer from the high bit disagreement rate and low bit …