2020
DOI: 10.3390/e22111261
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Key Technologies in Physical Layer Security

Abstract: The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 108 publications
0
31
0
Order By: Relevance
“…Considering the results in Figs. 6, we can state that not all the randomness features evaluated by the selected NIST tests are sensitive to the scenario. In the examined cases, the multipath richness of the 3GPP scenario significantly improves the test outcome only in the cases of the cumulative sum reverse/forward test (Figs.…”
Section: ) Legitimate Node Secrecy Performancementioning
confidence: 97%
See 1 more Smart Citation
“…Considering the results in Figs. 6, we can state that not all the randomness features evaluated by the selected NIST tests are sensitive to the scenario. In the examined cases, the multipath richness of the 3GPP scenario significantly improves the test outcome only in the cases of the cumulative sum reverse/forward test (Figs.…”
Section: ) Legitimate Node Secrecy Performancementioning
confidence: 97%
“…Unlike classical cryptography, key-based PLS techniques relay on the inherent randomness of the wireless channel to generate encryption keys without requiring expensive computation [1]. This approach differs also from key-less PLS techniques, which for example exploit beam forming or artificial noise injection to degrade the signal in directions different from the one of intended communication [6] and that do not use the physical layer for key generation. In fact, a critical step in the majority of security systems is the establishment of authenticated keys, which is, for instance a central requirement for IoT security.…”
Section: Introductionmentioning
confidence: 99%
“…Recent advances in quantum computing pose a serious threat to the currently used cryptographic schemes with their unlimited computational capacity. Therefore, it is evident that the conventional methods of secure wireless communication are becoming less reliable (Sanenga et al, 2020). So far, all encryption algorithms have been broken-or eventually will be, and thus, communication could have been compromised or will be in the future.…”
Section: Parameters Of Frequency and Securitymentioning
confidence: 99%
“…With the rapid spread of IoT devices and the introduction of 5G, the demand for wireless communication with high security as well as high data rate is increasing for Beyond 5G (6G) [1,2,3,4,5,6]. Among wireless communication security techniques, physical layer security, which can provide unbreakable, provable and quantifiable secrecy from an information-theoretical point of view, has drawn significant attention [6,7,8,9,10,11]. Two primary attacks at the physical layer of a wireless network are jamming and eavesdropping [12,13].…”
Section: Introductionmentioning
confidence: 99%