2024
DOI: 10.1109/comst.2023.3327327
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks

Elmehdi Illi,
Marwa Qaraqe,
Saud Althunibat
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 280 publications
0
0
0
Order By: Relevance
“…However, this WMB is inherently vulnerable to eavesdropping because a transmitter ingenuously disseminates its broadcast message (BM) to unknown nodes. On the other hand, physical layer security (PLS) ensures nonzero secrecy capacity by maintaining the link quality of eavesdroppers below that of legitimate nodes [ 12 ], gaining significant attention as an effective alternative or complement to traditional cryptographic methods [ 13 , 14 ]. This approach is particularly useful in large-scale distributed networks where managing and sharing security keys may be challenging [ 14 , 15 ].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, this WMB is inherently vulnerable to eavesdropping because a transmitter ingenuously disseminates its broadcast message (BM) to unknown nodes. On the other hand, physical layer security (PLS) ensures nonzero secrecy capacity by maintaining the link quality of eavesdroppers below that of legitimate nodes [ 12 ], gaining significant attention as an effective alternative or complement to traditional cryptographic methods [ 13 , 14 ]. This approach is particularly useful in large-scale distributed networks where managing and sharing security keys may be challenging [ 14 , 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, physical layer security (PLS) ensures nonzero secrecy capacity by maintaining the link quality of eavesdroppers below that of legitimate nodes [ 12 ], gaining significant attention as an effective alternative or complement to traditional cryptographic methods [ 13 , 14 ]. This approach is particularly useful in large-scale distributed networks where managing and sharing security keys may be challenging [ 14 , 15 ]. Recently, its applications have been being extended to various networks, including satellite–terrestrial integrated networks [ 16 ], simultaneous wireless information and power transfer networks [ 17 ], and covert mmWave communication networks [ 18 ].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations