2019
DOI: 10.1109/comst.2018.2878035
|View full text |Cite
|
Sign up to set email alerts
|

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
330
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 575 publications
(330 citation statements)
references
References 402 publications
0
330
0
Order By: Relevance
“…Alice and Bob are assumed to have a single antenna each for simplicity, while Mallory has two transmit antennas. 1 The fading channel realization in the link Alice-Bob is denoted by the complex circularly symmetric Gaussian random variable H ∼ CN (0, σ 2 ). To obtain estimates of H, Alice and Bob exchange pilot signals X with E[|X| 2 ] ≤ P .…”
Section: Mim In W-skg Systems: Injection Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Alice and Bob are assumed to have a single antenna each for simplicity, while Mallory has two transmit antennas. 1 The fading channel realization in the link Alice-Bob is denoted by the complex circularly symmetric Gaussian random variable H ∼ CN (0, σ 2 ). To obtain estimates of H, Alice and Bob exchange pilot signals X with E[|X| 2 ] ≤ P .…”
Section: Mim In W-skg Systems: Injection Attacksmentioning
confidence: 99%
“…In the past two decades a large number of studies and patents appeared on the topic of wireless secret key generation (W-SKG) schemes that exploit channel reciprocity as the source of shared randomness (see [1] for a comprehensive review and [2] for a tutorial on physical layer security including W-SKG). Additionally, W-SKG over unauthenticated channels has been proposed in [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, this is the symmetric key that is used both in encryption and decryption process. For example, if the original OFDM symbol is [a 0 , a 1 , a 2 , a 3 , a 4 , a 5 ], then the resulted randomized sequence is [a 5 , a 3 , a 1 , a 2 , a 4 ], where the key is [5,3,1,2,4]. The cyclic prefix (CP) is added after that to be able to extract frequency response of the channel at the receiver, which is detailed in § IV-B.…”
Section: A Transmitter Design Of Rand-ofdmmentioning
confidence: 99%
“…In that case, it is highly possible that the critical information will be leaked to the radar targets by the emission of the DFRC waveform. Given the fact above, physical layer security (PHY-security) must be considered in DFRC designs [7], [8]. Particularly, it has been widely understood that the communication secrecy could be enhanced by exploiting the artificial noise (AN).…”
Section: Introductionmentioning
confidence: 99%