Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Compute-and-forward: Harnessing interference through structured codes

B Nazer, M Gastpar - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
Interference is usually viewed as an obstacle to communication in wireless networks. This
paper proposes a new strategy, compute-and-forward, that exploits interference to obtain …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep
the information secret from a relay node despite wanting to enlist its help. For this scenario …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Reliable physical layer network coding

B Nazer, M Gastpar - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
When two or more users in a wireless network transmit simultaneously, their electromagnetic
signals are linearly superimposed on the channel. As a result, a receiver that is interested in …

Cooperative security at the physical layer: A summary of recent advances

R Bassily, E Ekrem, X He, E Tekin, J Xie… - IEEE Signal …, 2013 - ieeexplore.ieee.org
Wireless communications systems are particularly vulnerable to security attacks because of
the inherent openness of the transmission medium. In this article, we focus on guaranteeing …