Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

On optimizing VLC networks for downlink multi-user transmission: A survey

M Obeed, AM Salhab, MS Alouini… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The evolving explosion in high data rate services and applications will soon require the use
of untapped, abundant unregulated spectrum of the visible light for communications to …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Delay-intolerant covert communications with either fixed or random transmit power

S Yan, B He, X Zhou, Y Cong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study delay-intolerant covert communications in additive white Gaussian
noise (AWGN) channels with a finite block length, ie, a finite number of channel uses …

On covert communication with noise uncertainty

B He, S Yan, X Zhou, VKN Lau - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Prior studies on covert communication with noise uncertainty adopted a worst-case
approach from the warden's perspective. That is, the worst-case detection performance of …

On the design of secure non-orthogonal multiple access systems

B He, A Liu, N Yang, VKN Lau - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …

Covert communication achieved by a greedy relay in wireless networks

J Hu, S Yan, X Zhou, F Shu, J Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert wireless communication aims to hide the very existence of wireless transmissions in
order to guarantee a strong security in wireless networks. In this paper, we examine the …

Physical-layer security for MISO visible light communication channels

A Mostafa, L Lampe - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
This paper considers improving the confidentiality of visible light communication (VLC) links
within the framework of physical-layer security. We study a VLC scenario with one …