When physical layer key generation meets RIS: Opportunities, challenges, and road ahead

N Gao, Y Han, N Li, S Jin… - IEEE Wireless …, 2024 - ieeexplore.ieee.org
Physical layer key generation (PLKG) is a promising technology to obtain symmetric keys
between a pair of wireless communication users in a plug-and-play manner. The shared …

Secret key generation for intelligent reflecting surface assisted wireless communication networks

Z Ji, PL Yeoh, D Zhang, G Chen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We propose and analyze secret key generation using intelligent reflecting surface (IRS)
assisted wireless communication networks. To this end, we first formulate the minimum …

Safeguarding MTC at the physical layer: Potentials and challenges

DPM Osorio, EEB Olivo, H Alves, M Latva-Aho - IEEE Access, 2020 - ieeexplore.ieee.org
5G networks must provide a highly resilient, secure, and privacy-protected platform to
support the emergence of new business and technologies expected from the so-called …

Enabling efficient blockage-aware handover in RIS-assisted mmWave cellular networks

L Jiao, P Wang, A Alipour-Fanid… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, networks operate at frequencies over 28 GHz (mmWave) have emerged as a
viable solution for 5G mobile networks to provide Gbps data rate. Due to the high directivity …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

Federated continuous learning with broad network architecture

J Le, X Lei, N Mu, H Zhang, K Zeng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Federated learning (FL) is a machine-learning setting, where multiple clients collaboratively
train a model under the coordination of a central server. The clients' raw data are locally …

Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks

S Chen, Z Pang, H Wen, K Yu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, a scheme to detect both clone and Sybil attacks by using channel-based
machine learning is proposed. To identify malicious attacks, channel responses between …

Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Covert communications over multiple overt channels

SW Kim, HQ Ta - IEEE Transactions on Communications, 2021 - ieeexplore.ieee.org
We explore leveraging the multiplicity of overt (public) messages, destined for different
receivers through different channels, for hiding the transmission of a covert (private) …

ChirpKey: a chirp-level information-based key generation scheme for LoRa networks via perturbed compressed sensing

H Yang, Z Sun, H Liu, X Xia, Y Zhang… - … -IEEE Conference on …, 2023 - ieeexplore.ieee.org
Physical-layer key generation is promising in establishing a pair of cryptographic keys for
emerging LoRa networks. However, existing key generation systems may perform poorly …