Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Security trends in Internet of Things: A survey

Rachit, S Bhatt, PR Ragiri - SN Applied Sciences, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of embedded devices that are uniquely
identifiable and have embedded software required to communicate between the transient …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

Review and evaluation of MAC protocols for satellite IoT systems using nanosatellites

T Ferrer, S Céspedes, A Becerra - Sensors, 2019 - mdpi.com
Extending the internet of things (IoT) networks to remote areas under extreme conditions or
for serving sometimes unpredictable mobile applications has increased the need for satellite …

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects

A Srivastava, S Gupta, M Quamara… - International Journal …, 2020 - Wiley Online Library
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards
has fascinated noteworthy consideration from numerous research communities. In this view …

Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information

Z Qu, R Duan, X Han, S Zhao, Y Liu… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The channel state information (CSI) has been extensively studied in the literature to facilitate
authentication in wireless networks. The less focused is a systematic attack model to …

Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging

A Soni, R Upadhyay, A Kumar - Physical Communication, 2019 - Elsevier
Achieving information security in the Internet of things (IoT) by means of physical layer key
generation is an open research area. In the key generation, the secret key is generated …

Optimal system performance in multihop energy harvesting WSNs using cooperative NOMA and friendly jammers

C So-In, DD Tran, H Tran - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the system performance of multihop energy harvesting (EH)
wireless sensor networks (WSNs) with imperfect channel state information (CSI) using …

Physical layer security enhancement for Internet of Things in the presence of co-channel interference and multiple eavesdroppers

T Ssettumba, AH Abd El-Malek… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a multiuser system that utilizes transmit
antenna selection scheme at the base station and adopts threshold-based selection …