Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.

[1]  Hlaing Minn,et al.  Artificial Noise Aided Hybrid Precoding Design for Secure mmWave MISO Systems With Partial Channel Knowledge , 2017, IEEE Signal Processing Letters.

[2]  Haji M. Furqan,et al.  Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[3]  Havish Koorapaty,et al.  Secure information transmission for mobile radio , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[4]  Colleen Swanson,et al.  SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.

[5]  Jia Zhu,et al.  Transmit antenna selection to improve physical layer security for MIMO-CR systems , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[6]  M. Daly,et al.  Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.

[7]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  Zhijin Qin,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[10]  Xiaobo Li,et al.  An Artificial Noise Scheme for Secure Communication in Heterogeneous D2D and Cellular Networks , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[11]  Miaowen Wen,et al.  Secrecy-Enhancing Scheme for Spatial Modulation , 2018, IEEE Communications Letters.

[12]  Tolga M. Duman,et al.  Randomized Convolutional Codes for the Wiretap Channel , 2017, IEEE Transactions on Communications.

[13]  Lin Zhang,et al.  Design and Analysis of Physical Layer Security Based on Ill-Posed Theory for Optical OFDM-Based VLC System Over Real-Valued Visible Light Channel , 2016, IEEE Photonics Journal.

[14]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[15]  Erchin Serpedin,et al.  A comparative review on the wireless implantable medical devices privacy and security , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).

[16]  Lie-Liang Yang,et al.  Secret Precoding-Aided Spatial Modulation , 2015, IEEE Communications Letters.

[17]  Sung-Ju Lee,et al.  STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Victor C. M. Leung,et al.  Artificial Noise Assisted Secure Interference Networks With Wireless Power Transfer , 2017, IEEE Transactions on Vehicular Technology.

[19]  K. Cumanan,et al.  Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.

[20]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[21]  Yi Hong,et al.  Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.

[22]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[23]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[24]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[25]  Yueming Cai,et al.  Resource allocation for physical layer security in cooperative OFDM networks , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[26]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[27]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[28]  Sennur Ulukus,et al.  Polar Coding for the General Wiretap Channel With Extensions to Multiuser Scenarios , 2016, IEEE Journal on Selected Areas in Communications.

[29]  Victor C. M. Leung,et al.  Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.

[30]  H. Vincent Poor,et al.  Finite-blocklength bounds for wiretap channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[31]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[32]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.

[33]  Georges Kaddoum,et al.  On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.

[34]  Li Wang,et al.  Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.

[35]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[36]  Achilleas Anastasopoulos,et al.  Capacity achieving LDPC codes through puncturing , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.

[37]  C.-C. Jay Kuo,et al.  Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems , 2013, Springer Briefs in Electrical and Computer Engineering.

[38]  Khairi Ashour Hamdi,et al.  A low-complexity antenna subset modulation for secure millimeter-wave communication , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[39]  H. Sasaoka,et al.  A Private Key Agreement Scheme Based on Fluactions of BER in wireless Communications , 2007, The 9th International Conference on Advanced Communication Technology.

[40]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[41]  Mohamed-Slim Alouini,et al.  An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.

[42]  Yi Hong,et al.  Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.

[43]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[44]  Alexander Vardy,et al.  Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.

[45]  Jeffrey H. Reed,et al.  PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.

[46]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[47]  Bin Li,et al.  Secrecy Energy Efficiency Analysis of UAV-Enabled Communication Networks , 2017, ArXiv.

[48]  Taewon Hwang,et al.  Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[49]  Alex Reznik,et al.  On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[50]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[51]  Alexander Barg,et al.  Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component , 2015, ITW.

[52]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[53]  Wang Li,et al.  Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.

[54]  H. Vincent Poor,et al.  Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.

[55]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[56]  Masahide Sasaki,et al.  Numerical Study on Secrecy Capacity and Code Length Dependence of the Performances in Optical Wiretap Channels , 2015, IEEE Photonics Journal.

[57]  Wenjiang Feng,et al.  Cognitive radio network secure communication with and without cooperative jammer , 2014, 2014 International Conference on Advanced Technologies for Communications (ATC 2014).

[58]  Tharmalingam Ratnarajah,et al.  An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks , 2016, IEEE Transactions on Communications.

[59]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[60]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[61]  Gill R. Tsouri,et al.  Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.

[62]  Bingli Jiao,et al.  Secure Multiuser MIMO Downlink Transmission Via Precoding-Aided Spatial Modulation , 2016, IEEE Communications Letters.

[63]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[64]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[65]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[66]  Qinye Yin,et al.  Secure Transmissions in Millimeter Wave Systems , 2017, IEEE Transactions on Communications.

[67]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[68]  Frédérique E. Oggier,et al.  Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.

[69]  Ender Tekin,et al.  The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.

[70]  Khairi Ashour Hamdi,et al.  Switched Phased-Array Transmission Architecture for Secure Millimeter-Wave Wireless Communication , 2016, IEEE Transactions on Communications.

[71]  Xiang-Gen Xia,et al.  A wireless secret key generation method based on Chinese remainder theorem in FDD systems , 2012, Science China Information Sciences.

[72]  Lutz H.-J. Lampe,et al.  Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.

[73]  Dennis L. Goeckel,et al.  Wireless physical-layer security performance of UWB systems , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[74]  Shlomi Arnon Visible Light Communication: Synchronization issues in visible light communication , 2015 .

[75]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[76]  Rachad Atat,et al.  On the Achievable Transmission Capacity of Secrecy-Based D2D Cellular Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[77]  Kaizhi Huang,et al.  Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[78]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[79]  Hu Jin,et al.  Combined antenna selection and beamforming for secure transmission in distributed antenna systems , 2013, 2013 International Conference on ICT Convergence (ICTC).

[80]  Montserrat Ros,et al.  A Comparative Survey of VANET Clustering Techniques , 2017, IEEE Communications Surveys & Tutorials.

[81]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[82]  Sanjeev Jain,et al.  A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..

[83]  Yueming Cai,et al.  Power allocation in a secure-aware device-to-device communication underlaying cellular network , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[84]  M. Taki,et al.  Spectral efficiency optimized secure broadcasting using adaptive modulation, coding and transmit power , 2013, 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA).

[85]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[86]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[87]  Stephan Ludwig,et al.  Secret key generation from static channels with untrusted relays , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[88]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[89]  Chiara Buratti,et al.  A Survey on Wireless Body Area Networks: Technologies and Design Challenges , 2014, IEEE Communications Surveys & Tutorials.

[90]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[91]  Haji M. Furqan,et al.  Secure communication via untrusted switchable decode-and-forward relay , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[92]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[93]  Jianwei Xie,et al.  Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[94]  George K. Karagiannidis,et al.  Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.

[95]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[96]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[97]  Xiaohui Zhang,et al.  Physical-Layer Secrecy Performance in Finite Blocklength Case , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[98]  Jamie S. Evans,et al.  Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).

[99]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[100]  Jiaheng Wang,et al.  Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.

[101]  Mohamed-Slim Alouini,et al.  Improved achievable secrecy rate of visible light communication with cooperative jamming , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[102]  A. Hajimiri,et al.  Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.

[103]  Tao Zhang,et al.  Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.

[104]  Julian Cheng,et al.  Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis , 2018, IEEE Transactions on Communications.

[105]  Jing Wang,et al.  Joint power allocation and artificial noise design for multiuser wiretap OFDM channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[106]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[107]  Yueming Cai,et al.  On the secrecy mutual information of spatial modulation with finite alphabet , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[108]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[109]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[110]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[111]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[112]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[113]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[114]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[115]  Dennis Goeckel,et al.  Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy , 2013, 2013 IEEE International Symposium on Information Theory.

[116]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[117]  Hüseyin Arslan,et al.  Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[118]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[119]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[120]  Qinye Yin,et al.  Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.

[121]  Zhi Chen,et al.  Secure D2D-enabled cellular communication against selective eavesdropping , 2017, 2017 IEEE International Conference on Communications (ICC).

[122]  Hlaing Minn,et al.  Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.

[123]  Marco Baldi,et al.  Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[124]  Wayne P. Burleson,et al.  REFLEX: Reconfigurable logic for entropy extraction , 2014, 2014 27th IEEE International System-on-Chip Conference (SOCC).

[125]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[126]  Mohsen Guizani,et al.  Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate , 2018, IEEE Journal on Selected Areas in Communications.

[127]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.

[128]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[129]  H. Vincent Poor,et al.  On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.

[130]  Mohamed-Slim Alouini,et al.  On the Finite-SNR Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme under Secrecy Constraint , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[131]  Jun Zhou,et al.  Secure transmission for AF relaying spectrum-sharing systems with collaborative distributed beamforming , 2016, 2016 25th Wireless and Optical Communication Conference (WOCC).

[132]  Wenfei Liu,et al.  Transmit filter and artificial noise aided physical layer security for OFDM systems , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[133]  Ming Li,et al.  Hybrid Precoder and Combiner Design for Secure Transmission in mmWave MIMO Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[134]  Xiangjie Kong,et al.  A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.

[135]  A. M. Tonello,et al.  Physical layer security in PLC networks: Achievable secrecy rate and channel effects , 2013, 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications.

[136]  Ness B. Shroff,et al.  Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[137]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[138]  Naofal Al-Dhahir,et al.  Secure Sum-Rate-Optimal MIMO Multicasting Over Medium-Voltage NB-PLC Networks , 2018, IEEE Transactions on Smart Grid.

[139]  Ting Jiang,et al.  Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..

[140]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[141]  Gerd Ascheid,et al.  How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[142]  Leszek Szczecinski,et al.  Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).

[143]  Feng Xia,et al.  Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones , 2017, IEEE Transactions on Industrial Informatics.

[144]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[145]  Amirhossein Alimohammad,et al.  Design and Implementation of a Digital Secure Code-Shifted Reference UWB Transmitter and Receiver , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[146]  Honggang Wang,et al.  A key agreement method for wireless body area networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[147]  Khairi Ashour Hamdi,et al.  Silent Antenna Hopping Transmission Technique for Secure Millimeter-Wave Wireless Communication , 2014, GLOBECOM 2014.

[148]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[149]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of MISO Visible Light Communication Channels , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[150]  Lutz H.-J. Lampe,et al.  Pattern synthesis of massive LED arrays for secure visible light communication links , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[151]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[152]  Andrea M. Tonello,et al.  Physical layer security in power line communication networks: an emerging scenario, other than wireless , 2014, IET Commun..

[153]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[154]  Dongfeng Yuan,et al.  Joint Beamforming and Time Switching Design for Secrecy Rate Maximization in Wireless-Powered FD Relay Systems , 2018, IEEE Transactions on Vehicular Technology.

[155]  Zhiguo Ding,et al.  Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[156]  Seyed Mohammad Sajad Sadough,et al.  On Secure Free-Space Optical Communications Over Málaga Turbulence Channels , 2017, IEEE Wireless Communications Letters.

[157]  Hüseyin Arslan,et al.  Enhancing physical-layer security in wireless communications using signal space diversity , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[158]  Feng Xia,et al.  Vehicular Social Networks: Enabling Smart Mobility , 2017, IEEE Communications Magazine.

[159]  Bing Chen,et al.  Full Spectrum Sharing in Cognitive Radio Networks Toward 5G: A Survey , 2018, IEEE Access.

[160]  Tareq Y. Al-Naffouri,et al.  Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.

[161]  Pierre Duhamel,et al.  Rate Adaptation for Incremental Redundancy Secure HARQ , 2016, IEEE Transactions on Communications.

[162]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[163]  Marco Baldi,et al.  Physical and Data-Link Security Techniques for Future Communication Systems , 2016 .

[164]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[165]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.

[166]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[167]  Yi Hong,et al.  Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.

[168]  Dieter Hogrefe,et al.  Towards robust key extraction from multipath wireless channels , 2012, Journal of Communications and Networks.

[169]  Zhen Yang,et al.  Secure transmission over the wiretap channel using polar codes and artificial noise , 2017, IET Commun..

[170]  Lutz H.-J. Lampe,et al.  Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[171]  Taewon Hwang,et al.  Energy-Efficient Link Adaptation for Secure D2D Underlaid Cellular Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[172]  Zhiguo Ding,et al.  Spatio-Temporal Artificial Noise Design for Secure MISOSE-OFDM Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[173]  Hüseyin Arslan,et al.  A survey: Spoofing attacks in physical layer security , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).

[174]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[175]  Gregory Epiphaniou,et al.  Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks , 2018, IEEE Internet of Things Journal.

[176]  Haji M. Furqan,et al.  Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[177]  Ivan B. Djordjevic,et al.  Physical-Layer Security in Orbital Angular Momentum Multiplexing Free-Space Optical Communications , 2016, IEEE Photonics Journal.

[178]  Yong-Hwa Kim,et al.  The optimal power allocation for security in multicarrier relay power line communication , 2016, 2016 International Symposium on Power Line Communications and its Applications (ISPLC).

[179]  Victor C. M. Leung,et al.  Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[180]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[181]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[182]  Dennis Goeckel,et al.  Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming , 2017, IEEE Transactions on Communications.

[183]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[184]  Imre Csiszár,et al.  Secrecy generation for multiple input multiple output channel models , 2009, 2009 IEEE International Symposium on Information Theory.

[185]  Caijun Zhong,et al.  Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access , 2018, IEEE Journal on Selected Areas in Communications.

[186]  Walid Saad,et al.  On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[187]  Dimitris A. Pados,et al.  Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[188]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[189]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[190]  Jehad M. Hamamreh,et al.  Time-frequency characteristics and PAPR reduction of OTDM waveform for 5G and beyond , 2017, 2017 10th International Conference on Electrical and Electronics Engineering (ELECO).

[191]  Ming Li,et al.  Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.

[192]  Li Sun,et al.  Secure transmission through multihop relaying in wireless body area networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[193]  Quanzhong Li,et al.  Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks , 2017, IEEE Signal Processing Letters.

[194]  I. Motivation,et al.  Secret-Key Agreement Over Unauthenticated Public Channels—Part III: Privacy Amplification , 2003 .

[195]  Xiang Cheng,et al.  Index Modulation for 5G Wireless Communications , 2016 .

[196]  Tolga M. Duman,et al.  Physical Layer Security for Space Shift Keying Transmission With Precoding , 2016, IEEE Wireless Communications Letters.

[197]  Mohammad Abdullah Al Faruque,et al.  Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[198]  Haji M. Furqan,et al.  Cognitive Security of Wireless Communication Systems in the Physical Layer , 2017, Wirel. Commun. Mob. Comput..

[199]  Li Sun,et al.  Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.

[200]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[201]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[202]  F. Javier Lopez-Martinez,et al.  Physical-Layer Security in Free-Space Optical Communications , 2015, IEEE Photonics Journal.

[203]  Can Emre Koksal,et al.  How Vulnerable Is Vehicular Communication to Physical Layer Jamming Attacks? , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[204]  Dennis Goeckel,et al.  Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments , 2014, IEEE Transactions on Wireless Communications.

[205]  Lie-Liang Yang,et al.  Secure Spatial Modulation With a Full-Duplex Receiver , 2017, IEEE Wireless Communications Letters.

[206]  Qinye Yin,et al.  Secure transmission with artificial noise in millimeter wave systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[207]  Bingli Jiao,et al.  Artificial-noise strategy for single-antenna systems over multi-path fading channels , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[208]  Haji M. Furqan,et al.  Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[209]  Hong Wen,et al.  The realization of key extraction based on USRP and OFDM channel response , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[210]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[211]  Takahiko Saba,et al.  Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[212]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[213]  Nitesh Saxena,et al.  Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing , 2013, IEEE Transactions on Information Forensics and Security.

[214]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.

[215]  Tolga M. Duman,et al.  Randomized Serially Concatenated LDGM Codes for the Gaussian Wiretap Channel , 2018, IEEE Communications Letters.

[216]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[217]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[218]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[219]  Omid Abbasi,et al.  Secrecy analysis of a NOMA system with Full Duplex and Half Duplex Relay , 2017, 2017 Iran Workshop on Communication and Information Theory (IWCIT).

[220]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[221]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[222]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[223]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[224]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[225]  Wei-Ping Zhu,et al.  Improving secrecy performance via device-to-device jamming in cellular networks , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[226]  Yuan Ding,et al.  Retrodirective-Assisted Secure Wireless Key Establishment , 2017, IEEE Transactions on Communications.

[227]  João M. F. Xavier,et al.  Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.

[228]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[229]  Reihaneh Safavi-Naini,et al.  Secret key agreement using a virtual wiretap channel , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[230]  Erica L. Daly,et al.  Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.

[231]  Dac-Binh Ha,et al.  Physical layer security in UWB communication systems with transmit antenna selection , 2014, 2014 International Conference on Computing, Management and Telecommunications (ComManTel).

[232]  Mehmet A. Orgun,et al.  Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.

[233]  Aiqing Zhang,et al.  Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.

[234]  Li Sun,et al.  Statistical security model and power adaptation over wireless fading channels , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[235]  Jinho Choi,et al.  Secure Index and Data Symbol Modulation for OFDM-IM , 2017, IEEE Access.

[236]  Amitav Mukherjee,et al.  Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[237]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[238]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[239]  Khaled M. Rabie,et al.  Physical layer security of cooperative relaying power-line communication systems , 2016, 2016 International Symposium on Power Line Communications and its Applications (ISPLC).

[240]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[241]  Francis Minhthang Bui,et al.  Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.

[242]  Balasubramaniam Natarajan,et al.  Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.

[243]  Xiang Cheng,et al.  Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[244]  Hang Li,et al.  Optimal and Robust Secure Beamformer for Indoor MISO Visible Light Communication , 2016, Journal of Lightwave Technology.

[245]  Zhu Han,et al.  Transmit optimization for secure MIMO RFID wireless communication , 2016, 2016 IEEE International Conference on Communications (ICC).

[246]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[247]  Liang Yin,et al.  Physical-Layer Security in Multiuser Visible Light Communication Networks , 2018, IEEE Journal on Selected Areas in Communications.

[248]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[249]  Wan Choi,et al.  Joint Power and Rate Control for Device-to-Device Communications in Cellular Systems , 2015, IEEE Transactions on Wireless Communications.

[250]  Raksha Upadhyay,et al.  Internet of Things and Wireless Physical Layer Security: A Survey , 2017 .

[251]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[252]  Athanasios V. Vasilakos,et al.  Channel Information based Cryptography and Authentication in Wireless Body Area Networks , 2013, BODYNETS.

[253]  Limin Xiao,et al.  Power-efficient joint resource allocation for multiuser wiretap OFDM channels , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[254]  Gang Su,et al.  Transmit Antenna Selection for the Distributed MIMO Systems , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[255]  Xuelong Li,et al.  Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.

[256]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[257]  Xianbin Wang,et al.  Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.

[258]  Hüseyin Arslan,et al.  Randomized Beamforming With Generalized Selection Transmission for Security Enhancement in MISO Wiretap Channels , 2018, IEEE Access.

[259]  Emad Alsusa,et al.  Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting , 2018, IEEE Transactions on Vehicular Technology.

[260]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[261]  Xin Wang,et al.  Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.

[262]  Nicola Laurenti,et al.  Resource allocation for secret transmissions on parallel Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[263]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[264]  Victor C. M. Leung,et al.  Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks , 2018, IEEE Journal on Selected Areas in Communications.

[265]  Yahya Al-Harthi,et al.  Secret Key Generation Protocol for Optical OFDM Systems in Indoor VLC Networks , 2017, IEEE Photonics Journal.

[266]  Amitav Mukherjee Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems , 2016, IEEE Communications Letters.

[267]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[268]  Anh T. Pham,et al.  On the secrecy sum-rate of MU-VLC broadcast systems with confidential messages , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).

[269]  Michael A. Jensen,et al.  Secrecy Extraction from Increased Randomness in a Time-Variant MIMO Channel , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[270]  Hüseyin Arslan,et al.  N-continuous OFDM with CP alignment , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[271]  Hisato Iwai,et al.  Reliability-Based Sliced Error Correction in Secret Key Agreement from Fading Channel , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[272]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[273]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[274]  Li Sun,et al.  Cooperative jamming with untrusted SUs for secure communication of two-hop primary system , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[275]  Huiming Wang,et al.  Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[276]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[277]  Tao Hong,et al.  Peak-to-Average Power Ratio Reduction for an Artificial Noise Aided Secure Communication System , 2016, 2016 3rd International Conference on Information Science and Control Engineering (ICISCE).

[278]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[279]  Aydin Babakhani,et al.  A Near-Field Modulation Technique Using Antenna Reflector Switching , 2008, 2008 IEEE International Solid-State Circuits Conference - Digest of Technical Papers.

[280]  Lei Wang,et al.  Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.

[281]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[282]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[283]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[284]  MengChu Zhou,et al.  A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[285]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[286]  Sanjay Jha,et al.  Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints , 2014, IEEE Transactions on Information Forensics and Security.

[287]  Yingbo Hua,et al.  Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications , 2017, ArXiv.

[288]  Marco Chiani,et al.  Secret key extraction from a UWB channel: Analysis in a real environment , 2014, 2014 IEEE International Conference on Ultra-WideBand (ICUWB).

[289]  Yongming Huang,et al.  Robust Secure Beamforming for 5G Cellular Networks Coexisting With Satellite Networks , 2018, IEEE Journal on Selected Areas in Communications.

[290]  Hung Viet Nguyen,et al.  A Survey on Quantum Channel Capacities , 2018, IEEE Communications Surveys & Tutorials.

[291]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[292]  Nader Mokari,et al.  Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays , 2015, 2015 23rd Iranian Conference on Electrical Engineering.

[293]  Li Sun,et al.  Security protection over wireless fading channels by exploiting frequency selectivity , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[294]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.

[295]  Lin Zhang,et al.  High Security Differential Chaos-Based Modulation With Channel Scrambling for WDM-Aided VLC System , 2016, IEEE Photonics Journal.

[296]  Xiangyun Zhou,et al.  On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[297]  Qinghe Du,et al.  Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission , 2017, 2017 IEEE International Conference on Communications (ICC).

[298]  Qian Xu,et al.  Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.

[299]  Marco Di Renzo,et al.  On secrecy rate analysis of spatial modulation and space shift keying , 2015, 2015 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).

[300]  Xiang Cheng,et al.  An iterative FFT-based antenna subset modulation for secure millimeter wave communications , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[301]  Lutz H.-J. Lampe,et al.  Securing visible light communications via friendly jamming , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[302]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[303]  Lenan Wu,et al.  Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications , 2018, Int. J. Intell. Transp. Syst. Res..

[304]  Daniel Smith-Tone,et al.  Report on Post-Quantum Cryptography , 2016 .

[305]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[306]  Zhiguo Ding,et al.  Non-Orthogonal Multiple Access (NOMA) for 5G Systems , 2017 .

[307]  Xiaoshuang Xing,et al.  Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[308]  Liang Jin,et al.  A channel matched design of LDPC based secrecy coding for the fast fading channel , 2014, 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS).

[309]  Harald Haas,et al.  Index Modulation Techniques for Next-Generation Wireless Networks , 2017, IEEE Access.

[310]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[311]  Wei Xu,et al.  Secrecy-Oriented Transmitter Optimization for Visible Light Communication Systems , 2016, IEEE Photonics Journal.

[312]  Allan O. Steinhardt,et al.  Beamforming for Simultaneous Energy and Information Transfer and Physical-Layer Secrecy , 2017, IEEE Transactions on Wireless Communications.

[313]  Aylin Yener,et al.  Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[314]  Farshad Lahouti,et al.  Link adaptation for physical layer security over wireless fading channels , 2012, IET Commun..

[315]  Tolga M. Duman,et al.  Secure Space Shift Keying Transmission Using Dynamic Antenna Index Assignment , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[316]  Zhu Han,et al.  Physical Layer Security in MIMO Backscatter Wireless Systems , 2016, IEEE Transactions on Wireless Communications.

[317]  Michael A. Jensen,et al.  Random number generation from multipath propagation: MIMO-based encryption key establishment , 2009, 2009 IEEE Antennas and Propagation Society International Symposium.

[318]  Matthieu R. Bloch,et al.  Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.

[319]  Aijun Liu,et al.  Polar-LDPC Concatenated Coding for the AWGN Wiretap Channel , 2014, IEEE Communications Letters.

[320]  A Subramanian,et al.  Strong and weak secrecy in wiretap channels , 2010, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing.

[321]  Lorenzo Mucchi,et al.  Physical layer security for IoT devices configuration and key management - a Proof of Concept , 2016, 2016 AEIT International Annual Conference (AEIT).

[322]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[323]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[324]  Lutz H.-J. Lampe,et al.  Optimal and Robust Beamforming for Secure Transmission in MISO Visible-Light Communication Links , 2016, IEEE Transactions on Signal Processing.

[325]  Li Sun,et al.  Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[326]  Stark C. Draper,et al.  Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[327]  Dieter Hogrefe,et al.  Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[328]  Yiyang Pei,et al.  Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[329]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[330]  Hüseyin Arslan,et al.  Suppressing Alignment: Joint PAPR and Out-of-Band Power Leakage Reduction for OFDM-Based Systems , 2014, IEEE Transactions on Communications.

[331]  Guihai Chen,et al.  Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.

[332]  Hüseyin Arslan,et al.  Controlled Inter-Carrier Interference for Physical Layer Security in OFDM Systems , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[333]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[334]  Jiaheng Wang,et al.  Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.

[335]  Abbas Taherpour,et al.  Optimization of secrecy rate in cooperative device to device communications , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[336]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[337]  Junqing Zhang,et al.  Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[338]  Robert W. Heath,et al.  Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.

[339]  Lan Wang,et al.  Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.

[340]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[341]  Marco Baldi,et al.  Security gap performance of some LDPC code constructions , 2013, 2013 36th International Conference on Telecommunications and Signal Processing (TSP).

[342]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[343]  Zabih Ghassemlooy,et al.  Secured communications-zone multiple input multiple output visible light communications , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[344]  Jehad M. Hamamreh,et al.  On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..

[345]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[346]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.

[347]  Jehad M. Hamamreh,et al.  Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.

[348]  Zhiguo Ding,et al.  Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.

[349]  Evsen Yanmaz,et al.  Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.

[350]  Tadayoshi Kohno,et al.  Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.

[351]  Nicola Laurenti,et al.  Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.

[352]  Harald Haas,et al.  Secrecy Capacity of Space Keying with Two Antennas , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[353]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[354]  Remi A. Chou,et al.  Polar coding for the broadcast channel with confidential messages , 2015, ITW.

[355]  Wen-Qin Wang,et al.  Hybrid MIMO and Phased-Array Directional Modulation for Physical Layer Security in mmWave Wireless Communications , 2018, IEEE Journal on Selected Areas in Communications.

[356]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[357]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[358]  Il-Min Kim,et al.  BER-Based Physical Layer Security With Finite Codelength: Combining Strong Converse and Error Amplification , 2014, IEEE Transactions on Communications.

[359]  Jehad M. Hamamreh,et al.  A practical physical-layer security method for precoded OSTBC-based systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[360]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[361]  Yueming Cai,et al.  Joint Traffic Scheduling and Resource Allocations for Traffic Offloading With Secrecy Provisioning , 2017, IEEE Transactions on Vehicular Technology.

[362]  Naofal Al-Dhahir,et al.  Secure Space-Time Block Coding without Transmitter CSI , 2014, IEEE Wireless Communications Letters.

[363]  Lie-Liang Yang,et al.  Transmitter Precoding-Aided Spatial Modulation for Secrecy Communications , 2016, IEEE Transactions on Vehicular Technology.

[364]  H. Vincent Poor,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.

[365]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[366]  Walid Saad,et al.  On the physical layer security of backscatter RFID systems , 2012, 2012 International Symposium on Wireless Communication Systems (ISWCS).

[367]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[368]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[369]  Dennis Goeckel,et al.  Secrecy Rate Pair Constraints for Secure Throughput , 2014, 2014 IEEE Military Communications Conference.

[370]  Pierre Duhamel,et al.  Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[371]  Lei Guo,et al.  A New Eavesdropping-Resilient Framework for Indoor Visible Light Communication , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[372]  H. Sasaoka,et al.  A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio , 2007, The 9th International Conference on Advanced Communication Technology.

[373]  Matti Hämäläinen,et al.  An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards , 2017, IEEE Communications Surveys & Tutorials.

[374]  Jehad M. Hamamreh,et al.  Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[375]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[376]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[377]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[378]  Theodore S. Rappaport,et al.  Millimeter Wave Wireless Communications , 2014 .

[379]  Mohamed-Slim Alouini,et al.  On the input distribution and optimal beamforming for the MISO VLC wiretap channel , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[380]  Jonathan Rodriguez,et al.  A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.

[381]  Ling Liu,et al.  Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.

[382]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[383]  Xianbin Wang,et al.  Eavesdropping-Resilient OFDM System Using CSI-Based Dynamic Subcarrier Allocation , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[384]  Heng Zhou,et al.  Secret Key Generation in the Two-Way Relay Channel With Active Attackers , 2014, IEEE Transactions on Information Forensics and Security.

[385]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[386]  Ami Wiesel,et al.  Zero-Forcing Precoding and Generalized Inverses , 2008, IEEE Transactions on Signal Processing.

[387]  Alexander Vardy,et al.  A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.

[388]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[389]  Jehad M. Hamamreh,et al.  Joint PHY/MAC Layer Security Design Using ARQ With MRC and Null-Space Independent PAPR-Aware Artificial Noise in SISO Systems , 2018, IEEE Transactions on Wireless Communications.

[390]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[391]  Zhi Chen,et al.  Sum secrecy rate optimization for MIMOME wiretap channel with artificial noise and D2D underlay communication , 2017, 2017 IEEE International Conference on Communications (ICC).

[392]  Huiming Wang,et al.  Secrecy throughput maximization for millimeter wave systems with artificial noise , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[393]  Shiwen Mao,et al.  Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.

[394]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[395]  Robert W. Heath,et al.  Secure communication in cellular networks: The benefits of millimeter wave mobile broadband , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[396]  Panlong Yang,et al.  SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.

[397]  Stephen W. Neville,et al.  Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[398]  Zouheir Rezki,et al.  Optical Wiretap Channel With Input-Dependent Gaussian Noise Under Peak- and Average-Intensity Constraints , 2018, IEEE Transactions on Information Theory.

[399]  Lutz Lampe,et al.  Physical layer security in MIMO power line communication networks , 2014, 18th IEEE International Symposium on Power Line Communications and Its Applications.

[400]  Dennis Goeckel,et al.  Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.

[401]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[402]  Xia Wang,et al.  Spatial modulation aided physical layer security enhancement for fading wiretap channels , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[403]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[404]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[405]  Vincent K. N. Lau,et al.  Artificial Noise Injection for Securing Single-Antenna Systems , 2017, IEEE Transactions on Vehicular Technology.

[406]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[407]  Bingli Jiao,et al.  An Absolute Secure Wire-Line Communication Method Against Wiretapper , 2017, IEEE Communications Letters.

[408]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[409]  Naofal Al-Dhahir,et al.  Impact of the Wireless Network’s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid , 2017, IEEE Access.

[410]  Kostas Berberidis,et al.  Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.

[411]  Huifang Chen,et al.  A feedback-based secrecy coding scheme using polar code over wiretap channels , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[412]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[413]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[414]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[415]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[416]  李桥龙 Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels , 2013 .

[417]  Hongbin Chen,et al.  On Physical-Layer Security in Multiuser Visible Light Communication Systems With Non-Orthogonal Multiple Access , 2018, IEEE Access.