Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Evolution and impact of Wi-Fi technology and applications: A historical perspective

K Pahlavan, P Krishnamurthy - International Journal of Wireless …, 2021 - Springer
The IEEE 802.11 standard for wireless local area networking (WLAN), commercially known
as Wi-Fi, has become a necessity in our day-to-day life. Over a billion Wi-Fi access points …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …

From RSSI to CSI: Indoor localization via channel response

Z Yang, Z Zhou, Y Liu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The spatial features of emitted wireless signals are the basis of location distinction and
determination for wireless indoor localization. Available in mainstream wireless signal …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …