Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Robust tracking-based PHY-authentication in mmWave MIMO systems

L Afeef, HM Furqan, H Arslan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical Layer Authentication (PLA) is a topic of considerable interest in ensuring strong
security for upcoming wireless networks. However, existing PLA methods face challenges in …

Deep Learning-based RF Fingerprint Authentication with Chaotic Antenna Arrays

J McMillen, G Mumcu, Y Yilmaz - 2023 IEEE Wireless and …, 2023 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting is a tool which allows for authentication by utilizing
distinct and random distortions in a received signal based on characteristics of the …

Physical layer authentication scheme in beamspace MIMO systems

L Afeef, HM Furqan, H Arslan - IEEE Communications Letters, 2022 - ieeexplore.ieee.org
The broadcast nature of wireless communication makes it vulnerable to various security
threats such as spoofing attacks. Physical layer (PL) authentication has emerged as a …

Hardware and Deep Learning-Based Authentication through Enhanced RF Fingerprints of 3D-Printed Chaotic Antenna Arrays

J McMillen, FA Razak, G Mumcu, Y Yilmaz - IEEE Access, 2025 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting is a hardware-based authentication technique utilizing
the distinct distortions in the received signal due to the unique hardware differences in the …

A Proposed Cancelable Biometrical Recognition System (CBRS) Based on Developed Hénon Chaotic-Map

AHA El-aziem, A Abdelhafeez, THM Soliman - Wireless Personal …, 2024 - Springer
Nowadays, human biometrics are widely used in authentication systems. In reaction to
violent attacks, cancelable biometric patterns are developed from the original templates to …

Morphogenetic Metasurface Antennas for Secure Identification

R Amorim, Y Marie-Joseph, C Decroze… - IEEE Antennas and …, 2024 - ieeexplore.ieee.org
This letter presents the development of a generation technique of antennas to enhance
security identification on physical layer applications. Differently from the logical bit-level …

Physical Layer Security using Chaotic Antenna Arrays in Point-to-Point Wireless Communications

T Ranstrom, H Arslan, G Mumcu - 2024 IEEE Wireless and …, 2024 - ieeexplore.ieee.org
Chaotic antenna array (CAA) s are phased antenna arrays in which individual elements are
randomized in their array position, shape, and feed line length. These randomizations …

Physical layer security definition and domains

H Salman, H Arslan - 2023 - IET
Today's fast-paced world is becoming increasingly dependent on wireless communications.
Whether it is for businesses or individuals, mobility, portability, and instant access (via the …

Physical layer authentication in wireless communication systems

L Afeef, H Arslan - 2023 - IET
This chapter presents the physical-layer security mechanisms in the analog domain under
the name of physical layer authentication (PLA). PLA has attracted extensive research …