Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …

From RSSI to CSI: Indoor localization via channel response

Z Yang, Z Zhou, Y Liu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The spatial features of emitted wireless signals are the basis of location distinction and
determination for wireless indoor localization. Available in mainstream wireless signal …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information-
theoretical security and signal processing to secure physical layer systems. Although the …

Secret key extraction from wireless signal strength in real environments

SN Premnath, S Jana, J Croft, PL Gowda… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
We evaluate the effectiveness of secret key extraction, for private communication between
two wireless devices, from the received signal strength (RSS) variations on the wireless …