Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

A systematic literature review on the cyber security

Y Perwej, SQ Abbas, JP Dixit, N Akhtar… - International Journal of …, 2021 - hal.science
In recent years, the Internet has become an integral element of people's everyday lifestyles
all across the world. Online criminality, on the other hand, has risen in tandem with the …

A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Physical layer key generation in wireless networks: challenges and opportunities

K Zeng - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable research attention in recent years. Although theoretical …

Fast and practical secret key extraction by exploiting channel response

H Liu, Y Wang, J Yang, Y Chen - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
Securing wireless communication remains challenging in dynamic mobile environments due
to the shared nature of wireless medium and lacking of fixed key management …

Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]

K Zeng, K Govindan… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
Lower/physical layer characteristics have been considered as potential alternatives/
complements to provide security services in wireless networks. This article provides an …

Secret key generation exploiting channel characteristics in wireless communications

K Ren, H Su, Q Wang - IEEE Wireless Communications, 2011 - ieeexplore.ieee.org
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to
eavesdropping, message modification, and node impersonation. Securing the wireless …

LoRa-key: Secure key generation system for LoRa-based network

W Xu, S Jha, W Hu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …