Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Physical-layer security in 6G networks

L Mucchi, S Jayousi, S Caputo… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
The sixth generation (6G) of mobile network will be composed by different nodes, from
macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels

J Xu, L Duan, R Zhang - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
This letter proposes a paradigm shift in wireless security from preventing conventional
eavesdropping attacks to a new legitimate surveillance objective by studying how a …

Cell-free massive MIMO networks: Optimal power control against active eavesdropping

TM Hoang, HQ Ngo, TQ Duong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper studies the security aspect of a recently introduced “cell-free massive MIMO”
network under a pilot spoofing attack. First, a simple method to recognize the presence of …

Wireless information surveillance via proactive eavesdropping with spoofing relay

Y Zeng, R Zhang - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
Wireless information surveillance, by which suspicious wireless communications are closely
monitored by legitimate agencies, is an integral part of national security. To enhance the …

Proactive eavesdropping via cognitive jamming in fading channels

J Xu, L Duan, R Zhang - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …

Nested hash access with post quantum encryption for mission-critical iot communications

D Xu, L Liu, N Zhang, M Dong… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Secure ultrareliable low-latency communication (URLLC) has become a crucial requirement
of mission-critical Internet of Things (IoT) applications and use cases, including automotive …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …