Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Cyber-physical systems security—A survey

A Humayed, J Lin, F Li, B Luo - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …

Service level agreements for 5G and beyond: overview, challenges and enablers of 5G-healthcare systems

HN Qureshi, M Manalastas, SMA Zaidi, A Imran… - Ieee …, 2020 - ieeexplore.ieee.org
5G and beyond networks will transform the healthcare sector by opening possibilities for
novel use cases and applications. Service level agreements (SLAs) can enable 5G-enabled …

Cyber-physical systems: A security perspective

C Konstantinou, M Maniatakos, F Saqib… - 2015 20th IEEE …, 2015 - ieeexplore.ieee.org
A cyber-physical system (CPS) is a composition of independently interacting components,
including computational elements, communications and control systems. Applications of …

A novel deep learning strategy for classifying different attack patterns for deep brain implants

H Rathore, AK Al-Ali, A Mohamed, X Du… - IEEE Access, 2019 - ieeexplore.ieee.org
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged
restorative methodology, are a type of implantable medical device which uses electrical …

Access control schemes for implantable medical devices: A survey

L Wu, X Du, M Guizani… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Implantable medical devices (IMDs) are electronic devices implanted within human body for
diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are …

Finger-to-heart (F2H): Authentication for wireless implantable medical devices

G Zheng, W Yang, C Valli, L Qiao… - IEEE journal of …, 2018 - ieeexplore.ieee.org
Any proposal to provide security for implantable medical devices (IMDs), such as cardiac
pacemakers and defibrillators, has to achieve a trade-off between security and accessibility …

A review of security challenges, attacks and resolutions for wireless medical devices

H Rathore, A Mohamed, A Al-Ali, X Du… - 2017 13th …, 2017 - ieeexplore.ieee.org
Evolution of implantable medical devices for human beings has provided a radical new way
for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric …

Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: a scoping review

T Tervoort, MT De Oliveira, W Pieters… - IEEE …, 2020 - ieeexplore.ieee.org
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted
by a damaging attack is increased when medical devices are used which rely on …