To see the other types of publications on this topic, follow the link: Physical-layer security.

Journal articles on the topic 'Physical-layer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Physical-layer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Poor, H. Vincent, and Rafael F. Schaefer. "Wireless physical layer security." Proceedings of the National Academy of Sciences 114, no. 1 (December 27, 2016): 19–26. http://dx.doi.org/10.1073/pnas.1618130114.

Full text
Abstract:
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
APA, Harvard, Vancouver, ISO, and other styles
2

Mucchi, Lorenzo, Sara Jayousi, Stefano Caputo, Erdal Panayirci, Shahriar Shahabuddin, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, and Harald Haas. "Physical-Layer Security in 6G Networks." IEEE Open Journal of the Communications Society 2 (2021): 1901–14. http://dx.doi.org/10.1109/ojcoms.2021.3103735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeiffer, Johannes, and Robert F. H. Fischer. "Multilevel Coding for Physical-Layer Security." IEEE Transactions on Communications 70, no. 3 (March 2022): 1999–2009. http://dx.doi.org/10.1109/tcomm.2022.3145578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bloch, Matthieu, Merouane Debbah, Yingbin Liang, Yasutada Oohama, and Andrew Thangaraj. "Special issue on physical-layer security." Journal of Communications and Networks 14, no. 4 (August 2012): 349–51. http://dx.doi.org/10.1109/jcn.2012.6292260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huo, Yan, Yuqi Tian, Liran Ma, Xiuzhen Cheng, and Tao Jing. "Jamming Strategies for Physical Layer Security." IEEE Wireless Communications 25, no. 1 (February 2018): 148–53. http://dx.doi.org/10.1109/mwc.2017.1700015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humble, Travis. "Quantum security for the physical layer." IEEE Communications Magazine 51, no. 8 (August 2013): 56–62. http://dx.doi.org/10.1109/mcom.2013.6576339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trappe, Wade. "The challenges facing physical layer security." IEEE Communications Magazine 53, no. 6 (June 2015): 16–20. http://dx.doi.org/10.1109/mcom.2015.7120011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saad, Walid, Xiangyun Zhou, Mérouane Debbah, and H. Vincent Poor. "Wireless physical layer security [Guest Editorial]." IEEE Communications Magazine 53, no. 12 (December 2015): 18. http://dx.doi.org/10.1109/mcom.2015.7355560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kuljanski-Marić, Sonja. "LDPC codes for physical layer security." Vojnotehnicki glasnik 66, no. 4 (2018): 900–919. http://dx.doi.org/10.5937/vojtehg66-14776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Efstathiou, Dimitrios. "A collaborative physical layer security scheme." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1924. http://dx.doi.org/10.11591/ijece.v9i3.pp1924-1934.

Full text
Abstract:
<p>High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Yaacoub, Elias. "Physical Layer Security in Military Communications." International Journal of Mobile Computing and Multimedia Communications 10, no. 4 (October 2019): 26–40. http://dx.doi.org/10.4018/ijmcmc.2019100103.

Full text
Abstract:
Military communications need to be secure in harsh operational conditions under constant enemy attacks and attempts to eavesdrop, jam, or decrypt the communications. Physical layer security (PLS) can be used in conjunction with traditional cryptographic techniques to ensure an additional layer of security for military communications. In this article, PLS techniques at different levels of military communications, from communications at the military section level to the battalion or command center level, are discussed and analyzed. The presented solutions were tailored to the challenges faced in each scenario, leading to good performance. Additional challenges are also discussed, and suitable solutions are outlined.
APA, Harvard, Vancouver, ISO, and other styles
12

Liang, Yingbin, H. Vincent Poor, and Shlomo Shamai Shitz. "Physical layer security in broadcast networks." Security and Communication Networks 2, no. 3 (May 2009): 227–38. http://dx.doi.org/10.1002/sec.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Wenjun, Qinghe Du, Zhiwei Liu, Meng Wang, and Pinyi Ren. "Development of Physical Layer Security Simulation Platform." Procedia Computer Science 187 (2021): 495–500. http://dx.doi.org/10.1016/j.procs.2021.04.089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Eun-Kyu, Mario Gerla, and Soon Oh. "Physical layer security in wireless smart grid." IEEE Communications Magazine 50, no. 8 (August 2012): 46–52. http://dx.doi.org/10.1109/mcom.2012.6257526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Skorin-Kapov, Nina, Marija Furdek, Szilard Zsigmond, and Lena Wosinska. "Physical-layer security in evolving optical networks." IEEE Communications Magazine 54, no. 8 (August 2016): 110–17. http://dx.doi.org/10.1109/mcom.2016.7537185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Hui-Ming, Tong-Xing Zheng, Jinhong Yuan, Don Towsley, and Moon Ho Lee. "Physical Layer Security in Heterogeneous Cellular Networks." IEEE Transactions on Communications 64, no. 3 (March 2016): 1204–19. http://dx.doi.org/10.1109/tcomm.2016.2519402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zou, Yulong. "Physical-Layer Security for Spectrum Sharing Systems." IEEE Transactions on Wireless Communications 16, no. 2 (February 2017): 1319–29. http://dx.doi.org/10.1109/twc.2016.2645200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Basciftci, Yuksel Ozan, Can Emre Koksal, and Alexei Ashikhmin. "Physical-Layer Security in TDD Massive MIMO." IEEE Transactions on Information Theory 64, no. 11 (November 2018): 7359–80. http://dx.doi.org/10.1109/tit.2018.2855058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gong, Shiqi, Chengwen Xing, Sheng Chen, and Zesong Fei. "Polarization Sensitive Array Based Physical-Layer Security." IEEE Transactions on Vehicular Technology 67, no. 5 (May 2018): 3964–81. http://dx.doi.org/10.1109/tvt.2017.2773710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Jianchao, Liang Yang, and Mohamed-Slim Alouini. "Physical Layer Security for Cooperative NOMA Systems." IEEE Transactions on Vehicular Technology 67, no. 5 (May 2018): 4645–49. http://dx.doi.org/10.1109/tvt.2017.2789223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Wei, Jian Chen, Yonghong Kuo, and Yuchen Zhou. "Transmit Beamforming for Layered Physical Layer Security." IEEE Transactions on Vehicular Technology 68, no. 10 (October 2019): 9747–60. http://dx.doi.org/10.1109/tvt.2019.2932753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sasaki, Masahide, Hiroyuki Endo, Mikio Fujiwara, Mitsuo Kitamura, Toshiyuki Ito, Ryosuke Shimizu, and Morio Toyoshima. "Quantum photonic network and physical layer security." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, no. 2099 (June 26, 2017): 20160243. http://dx.doi.org/10.1098/rsta.2016.0243.

Full text
Abstract:
Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on–off keying transmission in a 7.8 km terrestrial FSO wiretap channel. This article is part of the themed issue ‘Quantum technology for the 21st century’.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (March 2, 2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.

Full text
Abstract:
Light-fidelity (LiFi) is a light-based wireless communication technology which can complement radio-frequency (RF) communication technologies for indoor applications. Although LiFi signals are spatially more contained than RF signals, the broadcasting nature of LiFi also makes it susceptible to eavesdropping. Therefore, it is important to secure the transmitted data against potential eavesdroppers. In this paper, an overview of the recent developments pertaining to LiFi physical layer security (PLS) is provided, and the main differences between LiFi PLS and RF PLS are explained. LiFi achievable secrecy rates and upper bounds are then investigated under practical channel models and transmission schemes. Beamforming and jamming, which received significant research attention recently as a means to achieve PLS in LiFi, are also investigated under indoor illumination constraints. Finally, future research directions of interest in LiFi PLS are identified and discussed. This article is part of the theme issue ‘Optical wireless communication’.
APA, Harvard, Vancouver, ISO, and other styles
24

Trulove, James. "Wired and Wireless Physical Layer Security Issues." Information Systems Security 10, no. 2 (May 2001): 1–9. http://dx.doi.org/10.1201/1086/43314.10.2.20010506/31403.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zheng, Gan, Pantelis-Daniel Arapoglou, and Bjorn Ottersten. "Physical Layer Security in Multibeam Satellite Systems." IEEE Transactions on Wireless Communications 11, no. 2 (February 2012): 852–63. http://dx.doi.org/10.1109/twc.2011.120911.111460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nusenu, Shaddrack Yaw, Wen‐Qin Wang, and Jie Xiong. "Time‐modulated FDA for physical‐layer security." IET Microwaves, Antennas & Propagation 11, no. 9 (June 22, 2017): 1274–79. http://dx.doi.org/10.1049/iet-map.2016.0930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Esat Ankaralı, Z., and Hüseyin Arslan. "Cyclic feature suppression for physical layer security." Physical Communication 25 (December 2017): 588–97. http://dx.doi.org/10.1016/j.phycom.2016.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Melki, Reem, Hassan N. Noura, Mohammad M. Mansour, and Ali Chehab. "A survey on OFDM physical layer security." Physical Communication 32 (February 2019): 1–30. http://dx.doi.org/10.1016/j.phycom.2018.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Fu, Xiaomei, Ling Li, and Qun Zong. "Bayesian Coalitional Game in Physical Layer Security." Wireless Personal Communications 85, no. 3 (June 30, 2015): 1237–50. http://dx.doi.org/10.1007/s11277-015-2837-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Efstathiou, Dimitrios. "ENHANCING PHYSICAL LAYER SECURITY OF OFDM SYSTEMS." Far East Journal of Electronics and Communications 18, no. 2 (March 21, 2018): 317–36. http://dx.doi.org/10.17654/ec018020317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Ning, Dajiang Chen, Feng Ye, Tong-Xing Zheng, and Zhiqing Wei. "Physical Layer Security for Internet of Things." Wireless Communications and Mobile Computing 2019 (April 18, 2019): 1–2. http://dx.doi.org/10.1155/2019/2627938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kamel, Mahmoud, Walaa Hamouda, and Amr Youssef. "Physical Layer Security in Ultra-Dense Networks." IEEE Wireless Communications Letters 6, no. 5 (October 2017): 690–93. http://dx.doi.org/10.1109/lwc.2017.2731840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Xin, Qilian Liang, Jiasong Mu, Wei Wang, and Baoju Zhang. "Physical layer security in wireless smart grid." Security and Communication Networks 8, no. 14 (March 12, 2013): 2431–39. http://dx.doi.org/10.1002/sec.751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Topal, Ozan Alp, Mehmet Ozgun Demir, Zekai Liang, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, and Gunes Karabulut Kur. "A Physical Layer Security Framework for Cognitive Cyber-Physical Systems." IEEE Wireless Communications 27, no. 4 (August 2020): 32–39. http://dx.doi.org/10.1109/mwc.01.1900543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nagamani, K., and R. Monisha. "Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm." Procedia Computer Science 215 (2022): 380–92. http://dx.doi.org/10.1016/j.procs.2022.12.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Myung, Jungho, Hwanjo Heo, and Jongdae Park. "Joint Beamforming and Jamming for Physical Layer Security." ETRI Journal 37, no. 5 (October 1, 2015): 898–905. http://dx.doi.org/10.4218/etrij.15.2415.0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zeng, Yao, Yuxi Tang, and Luping Xiang. "Physical Layer Security Design for Polar Code Construction." Cryptography 6, no. 3 (July 4, 2022): 35. http://dx.doi.org/10.3390/cryptography6030035.

Full text
Abstract:
In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information and enhance the security of the system. In this paper, we study the PLS of a polar-coded wireless communication system. To be more specific, we leverage the unique properties in polar code construction and propose a channel quality indicator (CQI)-based frozen-bit pattern generation scheme. The transmitter employs the Gaussian approximation algorithm to generate the corresponding frozen bit pattern according to the instantaneous CQI of the legitimate link. At the receiver, by leveraging the full channel reciprocity in the time-division duplex (TDD) mode, we can map the CQI to the corresponding frozen bit pattern and correctly decode the received bits. By contrast, the eavesdropper was unable to have the knowledge of the legal channel, and hence cannot determine the frozen bit pattern of the polar-coded bit sequence. Our simulation results demonstrate that by adopting the proposed PLS key generation scheme, Eve was hardly able to correctly decode a complete frame, leading to a high block error rate (BLER), while Bob was able to attain a 10−5 BLER.
APA, Harvard, Vancouver, ISO, and other styles
38

Liau, Qian, Chee Leow, and Zhiguo Ding. "Physical Layer Security Using Two-Path Successive Relaying." Sensors 16, no. 6 (June 9, 2016): 846. http://dx.doi.org/10.3390/s16060846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar, Megha S., R. Ramanathan, M. Jayakumar, and Devendra Kumar Yadav. "Secret Key Generation Schemes for Physical Layer Security." Defence Science Journal 71, no. 4 (July 1, 2021): 545–55. http://dx.doi.org/10.14429/dsj.71.15403.

Full text
Abstract:
Physical layer security (PLS) has evolved to be a pivotal technique in ensuring secure wireless communication. This paper presents a comprehensive analysis of the recent developments in physical layer secret key generation (PLSKG). The principle, procedure, techniques and performance metricesare investigated for PLSKG between a pair of users (PSKG) and for a group of users (GSKG). In this paper, a detailed comparison of the various parameters and techniques employed in different stages of key generation such as, channel probing, quantisation, encoding, information reconciliation (IR) and privacy amplification (PA) are provided. Apart from this, a comparison of bit disagreement rate, bit generation rate and approximate entropy is also presented. The work identifies PSKG and GSKG schemes which are practically realizable and also provides a discussion on the test bed employed for realising various PLSKG schemes. Moreover, a discussion on the research challenges in the area of PLSKG is also provided for future research.
APA, Harvard, Vancouver, ISO, and other styles
40

Chaganti, Rajasekhar, Deepti Gupta, and Naga Vemprala. "Intelligent Network Layer for Cyber-Physical Systems Security." International Journal of Smart Security Technologies 8, no. 2 (July 2021): 42–58. http://dx.doi.org/10.4018/ijsst.2021070103.

Full text
Abstract:
The cyber-physical system (CPS) has made tremendous progress in recent years and also disrupting technical fields ranging from health, transportation, industries, and more. However, CPS security is still one of the concerns for wide adoption owing to the high number of devices connecting to the internet and the traditional security solutions may not be suitable to protect the advanced, application-specific attacks. This paper presents a programmable device network layer architecture to combat attacks and efficient network monitoring in heterogeneous environment CPS applications. The authors leverage industrial control systems (ICS) to discuss the existing issues, highlighting the importance of advanced network layers for CPS. The programmable data plane language (P4) is introduced to detect well known HELLO flood attacks with minimal effort in the network level and show that programmable switches are suitable to implement security solutions in CPS applications.
APA, Harvard, Vancouver, ISO, and other styles
41

Sun, Li, Kamel Tourki, Yafei Hou, and Lu Wei. "Safeguarding 5G Networks through Physical Layer Security Technologies." Wireless Communications and Mobile Computing 2018 (September 25, 2018): 1–2. http://dx.doi.org/10.1155/2018/7503735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Badarneh, Osamah S., Paschalis C. Sofotasios, Sami Muhaidat, Simon L. Cotton, Khaled M. Rabie, and Naofal Aldhahir. "Achievable Physical-Layer Security Over Composite Fading Channels." IEEE Access 8 (2020): 195772–87. http://dx.doi.org/10.1109/access.2020.3033893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Luo, Xuewen, Yiliang Liu, Hsiao-Hwa Chen, and Qing Guo. "Physical Layer Security in Intelligently Connected Vehicle Networks." IEEE Network 34, no. 5 (September 2020): 232–39. http://dx.doi.org/10.1109/mnet.011.1900628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zhihui Shu, Yi Qian, and Song Ci. "On physical layer security for cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 28–33. http://dx.doi.org/10.1109/mnet.2013.6523805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Jiajia, Zhihong Liu, Yong Zeng, and Jianfeng Ma. "Cooperative Jammer Placement for Physical Layer Security Enhancement." IEEE Network 30, no. 6 (November 2016): 56–61. http://dx.doi.org/10.1109/mnet.2016.1600119nm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Saad, Walid, Xiangyun Zhou, Merouane Debbah, and H. Vincent Poor. "Wireless physical layer security: Part 1 [Guest Editorial]." IEEE Communications Magazine 53, no. 6 (June 2015): 15. http://dx.doi.org/10.1109/mcom.2015.7120010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Xiaoming, Caijun Zhong, Chau Yuen, and Hsiao-Hwa Chen. "Multi-antenna relay aided wireless physical layer security." IEEE Communications Magazine 53, no. 12 (December 2015): 40–46. http://dx.doi.org/10.1109/mcom.2015.7355564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Chao, and Hui-Ming Wang. "Physical Layer Security in Millimeter Wave Cellular Networks." IEEE Transactions on Wireless Communications 15, no. 8 (August 2016): 5569–85. http://dx.doi.org/10.1109/twc.2016.2562010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Qian, Hui-Ming Wang, Yi Zhang, and Zhu Han. "Physical Layer Security in MIMO Backscatter Wireless Systems." IEEE Transactions on Wireless Communications 15, no. 11 (November 2016): 7547–60. http://dx.doi.org/10.1109/twc.2016.2604800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shiu, Yi-Sheng, Shih Chang, Hsiao-Chun Wu, Scott Huang, and Hsiao-Hwa Chen. "Physical layer security in wireless networks: a tutorial." IEEE Wireless Communications 18, no. 2 (April 2011): 66–74. http://dx.doi.org/10.1109/mwc.2011.5751298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography