Article
Computer Science, Hardware & Architecture
Wali Ullah Khan, Eva Lagunas, Zain Ali, Muhammad Awais Javed, Manzoor Ahmed, Symeon Chatzinotas, Bjorn Ottersten, Petar Popovski
Summary: Unmanned aerial vehicles (UAVs) are important for next-generation wireless networks, providing high data rate communications and enhanced coverage. However, security is a challenge in UAV communications and physical layer security (PLS) is essential for improving reliability and security. Intelligent reflective surfaces (IRS) can extend and enhance wireless coverage through reconfiguring the communication environment. This article provides an overview of how IRS can improve the PLS of UAV networks.
IEEE WIRELESS COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Pablo Angueira, Inaki Val, Jon Montalban, Oscar Seijo, Eneko Iradier, Pablo Sanz Fontaneda, Lorenzo Fanari, Aitor Arriola
Summary: The industrial environment imposes strict requirements on the infrastructure of communication systems. Wireless systems are a solution, but they have weaknesses in reliability and security. This paper analyzes the security challenges of radio-frequency wireless systems in industrial applications and proposes a methodology for designing protection techniques.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Engineering, Electrical & Electronic
Tong-Xing Zheng, Xin Chen, Chao Wang, Kai-Kit Wong, Jinhong Yuan
Summary: This paper investigates physical layer security for a large-scale WSN with random multiple access, and proposes a random jamming scheme to defeat eavesdroppers. Analytical models are developed to characterize transmission reliability and secrecy, and an optimization problem is formulated to maximize the sum secrecy throughput. The results show that the random jamming scheme improves secrecy throughput, and the optimal jamming probability is determined by the trade-off between secrecy and throughput.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2022)
Article
Automation & Control Systems
Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang, Yueming Lu
Summary: The article proposes a scheme using channel-based machine learning to detect clone and Sybil attacks, by exploring channel responses between sensor peers for unique fingerprints, providing accurate authentication rates, and achieving success in industrial environments without manual labeling.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Telecommunications
R. Pradeep, R. Kanimozhi
Summary: Wireless communication technology is essential in our daily lives, but faces challenges such as secure transmission and energy efficiency. The proposed Hardware Efficient Secure Channel Coding Scheme aims to address these issues through innovative coding methods.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Youhong Feng, Shihao Yan, Nan Yang, Zhen Yang, Jinhong Yuan
Summary: This article clarifies key security issues in NOMA technology, including the channel conditions for eavesdroppers to use SIC for interference cancellation, the improvement of security for strong users and the reduction of security for weak users with NOMA, and strategies to protect weak user information while allowing strong users to benefit from NOMA. The article also discusses research challenges and future work in NOMA security.
Review
Chemistry, Multidisciplinary
Jawhara Boodai, Aminah Alqahtani, Mounir Frikha
Summary: Fifth generation (5G) wireless networks have the potential to revolutionize communication and internet connectivity, but they also bring new security challenges. This systematic review examines the current state of research on physical layer security in 5G networks, revealing progress made in developing solutions, but highlighting the need for further research and collaboration to address these challenges.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Gonzalo J. Anaya-Lopez, Gerardo Gomez, F. Javier Lopez-Martinez
Summary: The proposed attack compromises physical layer security in wireless systems by transmitting slowly-varying random symbols to increase the fading severity observed at the base station, leading to transmission to Bob at a rate larger than the secrecy capacity. Using multiple antennas at the base station may partially alleviate but not immunize against these attacks.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Information Systems
Samikkannu Rajkumar, Dushantha Nalin K. Jayakody, Reem Alkanhel, Ammar Muthanna
Summary: This paper studies the effective end-to-end secure communication of N-pair cellular network. It employs non-orthogonal multiple access (NOMA) and physical layer network coding (PLNC) scheme to improve efficiency, and uses physical layer security to ensure secure wireless communication. Closed form expressions for the end-to-end outage probability and secrecy outage probability of the proposed network are derived.
Review
Engineering, Multidisciplinary
Megha. S. Kumar, R. Ramanathan, M. Jayakumar
Summary: This article mainly highlights the importance of physical layer security in wireless network security and provides a systematic classification and survey of keyless schemes. Additionally, it discusses the application of keyless PLS in IoT and explores emerging areas for enhancing physical layer security, as well as existing challenges.
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH
(2022)
Article
Automation & Control Systems
Fei Pan, Hong Wen, Xuesong Gao, Haibo Pu, Zhibo Pang
Summary: Existing clone detection schemes for industrial wireless cyber-physical systems are either based on upper layer observations or physical layer channel state information. This article proposes a scheme that applies physical layer reputation and back propagation neural network to improve detection accuracy. The scheme accumulates physical layer reputations and inputs them to the neural network for attack detection and tracing.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Automation & Control Systems
Feiyi Xie, Zhibo Pang, Hong Wen, Wenxin Lei, Xinchen Xu
Summary: Edge computing plays a critical role in Industry 4.0 by providing a preprocessing platform with lower latency and higher security for handling data generated by terminals. However, access authentication is an important security issue in current edge computing systems. This article presents a solution that utilizes physical layer information to enhance access classification accuracy, achieving fast and low complexity secure access without increasing individual devices' sample size and computational complexity.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Jose David Vega Sanchez, Pablo Ramirez-Espinosa, F. Javier Lopez-Martinez
Summary: The analysis of physical layer security (PLS) performance in wireless communication links with a large reflecting surface (LRS) and phase errors shows that LRS-aided communications have great potential to enhance PLS in practical wireless set-ups. The eavesdropper's link is Rayleigh distributed and independent of the legitimate link, demonstrating different scaling laws for legitimate and eavesdroppers signal-to-noise ratios with the number of reflecting elements. Additionally, even with coarse phase quantization, the performance is reasonably good, indicating promising results for PLS enhancements.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
Computer Science, Theory & Methods
Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro
Summary: Physical-layer security is an important topic in wireless communications, and recent research has focused on using deep learning algorithms for sender authentication. Prior work has mainly focused on terrestrial wireless devices and has not considered satellite transmitters. This paper investigates the use of AI-based solutions for the authentication of Low-Earth Orbit (LEO) satellites, which present unique challenges due to their non-standard electronics and specific characteristics. The study uses a large dataset collected from an extensive measurement campaign on the IRIDIUM LEO satellites and shows that Convolutional Neural Networks (CNN) and autoencoders can be successfully used for authentication with high accuracy. However, the number of samples required and the low bandwidth of the satellite link may limit the detection of spoofing attacks under certain configuration parameters.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Megha S. Kumar, R. Ramanathan, M. Jayakumar, Devendra Kumar Yadav
Summary: This paper proposes a method for dynamic secret key generation in indoor environments using discrete wavelet packet transform (DWPT). Two schemes are introduced, with Prop. method-1 performing well under high measurement error variance and Prop. method-2 providing better randomness. Both methods pass NIST randomness tests and simulation results demonstrate the feasibility of DWPT.