Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Secure full duplex integrated sensing and communications

A Bazzi, M Chafii - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
The following paper models a secure full duplex (FD) integrated sensing and
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …

Smoothing of binary codes, uniform distributions, and applications

M Pathegama, A Barg - Entropy, 2023 - mdpi.com
The action of a noise operator on a code transforms it into a distribution on the respective
space. Some common examples from information theory include Bernoulli noise acting on a …

Secret key generation over biased physical unclonable functions with polar codes

B Chen, FMJ Willems - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources,
which makes them vulnerable to physical and cloning attacks. To secure IoT devices …

Polar coding for the broadcast channel with confidential messages: A random binning analogy

RA Chou, MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We develop a low-complexity polar coding scheme for the discrete memoryless broadcast
channel with confidential messages under strong secrecy and randomness constraints. Our …

Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

V Yachongka, H Yagi, H Ochiai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …

A robust SRAM-PUF key generation scheme based on polar codes

B Chen, T Ignatenko, FMJ Willems… - … 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are relatively new security primitives used for device
authentication and device-specific secret key generation. In this paper we focus on SRAM …