A survey of device-to-device communications: Research issues and challenges

F Jameel, Z Hamid, F Jabeen… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-Device (D2D) communication has emerged as a promising technology for
optimizing spectral efficiency in future cellular networks. D2D takes advantage of the …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Radio frequency fingerprint identification for LoRa using deep learning

G Shen, J Zhang, A Marshall, L Peng… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Radio frequency fingerprint identification (RFFI) is an emerging device authentication
technique that relies on the intrinsic hardware characteristics of wireless devices. This paper …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Radio frequency fingerprint identification for narrowband systems, modelling and classification

J Zhang, R Woods, M Sandell… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Device authentication is essential for securing Internet of things. Radio frequency fingerprint
identification (RFFI) is an emerging technique that exploits intrinsic and unique hardware …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

Physical-layer authentication for wireless security enhancement: Current challenges and future developments

X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
While the open nature of radio propagation enables convenient “anywhere” wireless access,
it becomes the root of security vulnerabilities in wireless communications. In light of this …