Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Secure full duplex integrated sensing and communications
A Bazzi, M Chafii - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
The following paper models a secure full duplex (FD) integrated sensing and
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
Smoothing of binary codes, uniform distributions, and applications
M Pathegama, A Barg - Entropy, 2023 - mdpi.com
The action of a noise operator on a code transforms it into a distribution on the respective
space. Some common examples from information theory include Bernoulli noise acting on a …
space. Some common examples from information theory include Bernoulli noise acting on a …
Secret key generation over biased physical unclonable functions with polar codes
B Chen, FMJ Willems - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …
Polar coding for the broadcast channel with confidential messages: A random binning analogy
We develop a low-complexity polar coding scheme for the discrete memoryless broadcast
channel with confidential messages under strong secrecy and randomness constraints. Our …
channel with confidential messages under strong secrecy and randomness constraints. Our …
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
V Yachongka, H Yagi, H Ochiai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …
authentication of users and devices with small chips, owing to its lightweight security. In the …
A robust SRAM-PUF key generation scheme based on polar codes
Physical unclonable functions (PUFs) are relatively new security primitives used for device
authentication and device-specific secret key generation. In this paper we focus on SRAM …
authentication and device-specific secret key generation. In this paper we focus on SRAM …