Skip to Content

561 Results Found

  • Article
  • Open Access
18 Citations
6,687 Views
23 Pages

Review of Physical Layer Security in 5G Wireless Networks

  • Jawhara Boodai,
  • Aminah Alqahtani and
  • Mounir Frikha

19 June 2023

Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas o...

  • Review
  • Open Access
63 Citations
11,530 Views
34 Pages

An Overview of Key Technologies in Physical Layer Security

  • Abraham Sanenga,
  • Galefang Allycan Mapunda,
  • Tshepiso Merapelo Ludo Jacob,
  • Leatile Marata,
  • Bokamoso Basutli and
  • Joseph Monamati Chuma

6 November 2020

The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives ri...

  • Essay
  • Open Access
1,681 Views
12 Pages

Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the diffic...

  • Article
  • Open Access
69 Citations
10,355 Views
17 Pages

The Role of Physical Layer Security in IoT: A Novel Perspective

  • Tommaso Pecorella,
  • Luca Brilli and
  • Lorenzo Mucchi

2 August 2016

This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the proble...

  • Article
  • Open Access
6 Citations
3,688 Views
15 Pages

Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach

  • Willie K. Harrison,
  • Elise Beard,
  • Scott Dye,
  • Erin Holmes,
  • Kaela Nelson,
  • Marco A. C. Gomes and
  • João P. Vilela

1 August 2019

In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy...

  • Article
  • Open Access
5 Citations
4,065 Views
16 Pages

In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information...

  • Article
  • Open Access
5 Citations
3,322 Views
15 Pages

23 October 2024

This paper presents an advanced framework for securing 6G communication by integrating deep learning and physical layer security (PLS). The proposed model incorporates multi-stage detection mechanisms to enhance security against various attacks on th...

  • Review
  • Open Access
14 Citations
11,180 Views
40 Pages

Survey on 5G Physical Layer Security Threats and Countermeasures

  • Michal Harvanek,
  • Jan Bolcek,
  • Jan Kufa,
  • Ladislav Polak,
  • Marek Simka and
  • Roman Marsalek

26 August 2024

With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile c...

  • Review
  • Open Access
9 Citations
5,121 Views
19 Pages

A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network

  • Attique Ur Rehman,
  • Muhammad Sajid Mahmood,
  • Shoaib Zafar,
  • Muhammad Ahsan Raza,
  • Fahad Qaswar,
  • Sumayh S. Aljameel,
  • Irfan Ullah Khan and
  • Nida Aslam

12 August 2022

Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wirel...

  • Article
  • Open Access
2 Citations
1,755 Views
17 Pages

19 November 2023

With the continuous development of millimeter-wave communication technology, new requirements such as ultra-reliability and higher data rates pose new challenges to the security issues of traditional cryptographic encryption in vehicular ad hoc netwo...

  • Article
  • Open Access
2,703 Views
14 Pages

21 August 2021

The evolution journey of optical network (ON) towards heterogeneous and flexible frameworks with high order of applications is continued from the last decade. Furthermore, the prominence of optical security, amount of transmitted data, bandwidth, and...

  • Review
  • Open Access
5 Citations
4,864 Views
30 Pages

11 November 2024

With the success and commercialization of 5G, 3GPP has started working toward the sixth generation of communication systems. While 5G explored the concept of non-terrestrial networks like satellites and unmanned aerial vehicles working alongside terr...

  • Article
  • Open Access
6 Citations
3,318 Views
11 Pages

22 December 2020

In this paper, we proposed a scheme that Injects artificial noise from the tag end (IANT) to enhance the physical layer security of the ambient backscatter communication (ABC) system. The difference between the ABC system and the traditional radio fr...

  • Article
  • Open Access
5 Citations
4,364 Views
12 Pages

6 April 2017

Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel...

  • Article
  • Open Access
2 Citations
1,921 Views
13 Pages

Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel

  • Daniel Harman,
  • Karl Knapp,
  • Tyler Sweat,
  • Philip Lundrigan,
  • Michael Rice and
  • Willie Harrison

29 September 2023

Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap ch...

  • Article
  • Open Access
3 Citations
3,423 Views
15 Pages

On the Physical Layer Security Characteristics for MIMO-SVD Techniques for SC-FDE Schemes

  • João Madeira,
  • João Guerreiro,
  • Rui Dinis,
  • Paulo Montezuma and
  • Luís Miguel Campos

1 November 2019

Multi-Input, Multi-Output (MIMO) techniques are seeing widespread usage in wireless communication systems due to their large capacity gains. On the other hand, security is a concern of any wireless system, which can make schemes that implement physic...

  • Article
  • Open Access
2 Citations
1,280 Views
14 Pages

30 November 2024

In recent years, ensuring communication security at the physical layer has become increasingly important due to the transmission of sensitive information over various networks. Traditional approaches to physical layer security often rely on artificia...

  • Article
  • Open Access
5 Citations
5,425 Views
21 Pages

28 June 2017

Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication...

  • Review
  • Open Access
600 Views
29 Pages

31 December 2025

Terahertz (THz) communication above 100 GHz is widely recognized as a key enabler for sixth-generation (6G) networks because of its ultra-broad bandwidth and strong directionality. Meanwhile, the rapid evolution of artificial intelligence has conside...

  • Feature Paper
  • Article
  • Open Access
17 Citations
5,168 Views
13 Pages

Challenges in Physical Layer Security for Visible Light Communication Systems

  • Sunghwan Cho,
  • Gaojie Chen,
  • Justin P. Coon and
  • Pei Xiao

20 January 2022

This article highlights challenges associated with securing visible light communication (VLC) systems by using physical layer security (PLS) techniques. Motivated by the achievements in PLS studies for radio frequency (RF) communication, many PLS tec...

  • Article
  • Open Access
5 Citations
3,566 Views
19 Pages

Physical-Layer Security Analysis over M-Distributed Fading Channels

  • Sheng-Hong Lin,
  • Rong-Rong Lu,
  • Xian-Tao Fu,
  • An-Ling Tong and
  • Jin-Yuan Wang

12 October 2019

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower boun...

  • Article
  • Open Access
2 Citations
1,748 Views
18 Pages

11 July 2023

In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception pr...

  • Review
  • Open Access
103 Citations
8,697 Views
21 Pages

23 September 2018

With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and m...

  • Article
  • Open Access
2 Citations
3,862 Views
17 Pages

21 February 2023

In this work, we mainly focus on low probability detection (LPD) and low probability interception (LPI) wireless communication in cyber-physical systems. An LPD signal waveform based on multi-carrier modulation and an under-sampling method for signal...

  • Article
  • Open Access
5 Citations
2,745 Views
10 Pages

In this paper, we propose a beamformer design scheme for wireless physical layer security using partial channel state information (CSI) in millimeter wave channels. The partial CSI used in this work is the range of angle-of-departure (AOD). Assuming...

  • Article
  • Open Access
6 Citations
2,781 Views
18 Pages

Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps

  • Mariam Abu Al-Atta,
  • Karim A. Said,
  • Mohamed A. Mohamed and
  • Walid Raslan

10 January 2023

Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security h...

  • Feature Paper
  • Article
  • Open Access
4 Citations
4,126 Views
20 Pages

A Physical Layer Security Technique for NOMA Systems with MIMO SC-FDE Schemes

  • João Madeira,
  • João Guerreiro,
  • Hugo Serra,
  • Rui Dinis,
  • Paulo Montezuma and
  • Luís Miguel Campos

Current wireless communication systems employ Multi-Input, Multi-Output (MIMO) techniques to increase spectral efficiency, at the cost of higher hardware complexity. Most of these systems continue to employ traditional Orthogonal Multiple Access (OMA...

  • Review
  • Open Access
10 Citations
4,783 Views
36 Pages

9 May 2022

With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to...

  • Article
  • Open Access
8 Citations
3,454 Views
8 Pages

20 February 2022

This paper discusses the concept and practicality of internet-of-things (IoT) link security enhancements using multiple-input multiple-output (MIMO) and beamforming solutions at the physical layer of the wireless system. Large-scale MIMO and beamform...

  • Article
  • Open Access
5 Citations
4,385 Views
15 Pages

SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security

  • André Silva,
  • Marco Gomes,
  • João P. Vilela and
  • Willie K. Harrison

28 January 2021

In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e., coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled codin...

  • Article
  • Open Access

RIS-Assisted Physical Layer Security for Cell-Free ISAC Systems

  • Na Chen,
  • Guijie Lin,
  • Rubing Jian,
  • Yusheng Wang,
  • Jianquan Wang,
  • Lei Sun,
  • Wei Li,
  • Minoru Okada,
  • Qu Wang and
  • Changyuan Yu
  • + 1 author

23 February 2026

Physical layer security (PLS) is a fundamental challenge for sixth-generation (6G) wireless networks, particularly in integrated sensing and communication (ISAC) systems, where sensing targets may simultaneously act as potential eavesdroppers. In thi...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,574 Views
18 Pages

26 February 2023

Mobile edge cache (MEC)-enabled air-to-ground integrated Internet of Vehicles (IoV) technology can solve wireless network backhaul congestion and high latency, but security problems such as eavesdropping are often ignored when designing cache strateg...

  • Article
  • Open Access
7 Citations
2,605 Views
16 Pages

The massive connectivity requirement and security issues have become major factors restricting the further development of the Internet of Things. Nonorthogonal multiple access (NOMA) can be combined with physical layer security (PLS) to achieve massi...

  • Article
  • Open Access
170 Views
18 Pages

Manifold Optimization for Physical Layer Security in Double-RIS-Assisted Communications

  • Jin Li,
  • Siyao Chen,
  • Ziyi Wang,
  • Haofei Lu,
  • Yonghao Chen,
  • Yunchao Song,
  • Yuanjian Liu and
  • Weigang Wang

Reconfigurable intelligent surfaces (RISs) are an emerging wireless communication technology that has attracted significant attention, particularly in the field of physical layer security (PLS). This paper proposes a novel double-RIS-aided PLS commun...

  • Article
  • Open Access
4 Citations
2,024 Views
15 Pages

Physical Layer Security in RIS-NOMA-Assisted IoV Systems with Uncertain RIS Deployment

  • Jinyuan Gu,
  • Zhao Zhang,
  • Wei Duan,
  • Feifei Song and
  • Huaiping Zhang

12 November 2024

Reconfigurable intelligent surfaces (RISs), as an emerging radio technology, are widely used to expand the transmission distance and structure cascade channels to improve the performance of communication systems. However, based on the continuous deve...

  • Feature Paper
  • Article
  • Open Access
16 Citations
5,741 Views
21 Pages

10 July 2017

In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple-output (MIMO) systems with underlay spectrum sharing is investigated. A secondary (cognitive) multi-user massive MIMO system is operated by using und...

  • Review
  • Open Access
1 Citations
2,877 Views
29 Pages

16 April 2025

The aerial–terrestrial integrated Internet of Things (ATI-IoT) utilizes both aerial platforms (e.g., drones and high-altitude platform stations) and terrestrial networks to establish comprehensive and seamless connectivity across diverse geogra...

  • Article
  • Open Access
6 Citations
4,290 Views
21 Pages

20 January 2022

Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platforms to assist air-to-ground cooperative communication. This paper investigates a joint safety information interaction scheme for a UAV-enabled network...

  • Article
  • Open Access
1 Citations
1,741 Views
16 Pages

10 November 2023

As one of the main candidates for future civil aviation communications systems, the L-band digital aeronautical communication system (L-DACS) is expected to achieve secure and reliable transmission. Due to the broadcasting nature of air–ground...

  • Article
  • Open Access
2 Citations
3,237 Views
22 Pages

17 February 2020

Since the cloud radio access network (C-RAN) transmits information signals by jointly transmission, the multiple copies of information signals might be eavesdropped on. Therefore, this paper studies the resource allocation algorithm for secure energy...

  • Article
  • Open Access
10 Citations
3,811 Views
11 Pages

10 July 2021

Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-...

  • Article
  • Open Access
18 Citations
5,208 Views
19 Pages

15 February 2017

In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selecti...

  • Article
  • Open Access
4 Citations
1,894 Views
20 Pages

11 October 2022

The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap. Under the assumption of the equal propagation conditions (both for the legitimate receiv...

  • Communication
  • Open Access
20 Citations
5,829 Views
12 Pages

19 February 2021

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting...

  • Article
  • Open Access
13 Citations
3,387 Views
16 Pages

4 August 2021

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be fol...

  • Article
  • Open Access
1,567 Views
13 Pages

23 February 2024

In the fast-changing world of wireless communications, the combination of extremely large antenna arrays (ELAAs) and energy-efficient transmission methods is envisioned for the 6G. The application of directivity in the transmitted constellation can i...

  • Article
  • Open Access
3 Citations
2,901 Views
22 Pages

14 March 2025

With the wide application of unmanned aerial vehicles (UAVs) in the military and civilian fields, the physical layer security of UAV-assisted communication has attracted more and more attention in recent years. Reconfigurable intelligent surface (RIS...

  • Article
  • Open Access
2 Citations
2,898 Views
16 Pages

4 September 2018

Cooperative relaying is an effective technology to improve the capacity of physical-layer security, in which the relay helps forward the received signal to the destination. In this paper, a cooperative compressive sensing and amplify-and-forward (CCS...

  • Article
  • Open Access
13 Citations
2,558 Views
23 Pages

10 August 2024

Intentional electromagnetic interference attacks (e.g., jamming) against wireless connected devices such as the Internet of Things (IoT) remain a serious challenge, especially as such attacks evolve in complexity. Similarly, eavesdropping on wireless...

  • Article
  • Open Access
2 Citations
4,226 Views
26 Pages

6 December 2019

Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive...

of 12