Research Topic

Physical layer security: From theory to practice

About this Research Topic

In the recent years, with the emergence of quantum computing, the security of communications is vulnerable to key detection. On the other hand, ultra-low delays and targeting have become vital in a large group of upcoming applications in beyond 5G (B5G) systems and Internet-of-Things (IoT). Based on these facts, the increasing complexity and the required overhead of cryptographic designs may cause a challenge for B5G systems and IoT to connect everything (e.g., people, machines) together with very low latency. For example, NIST key management guidelines propose that the RSA keys lengths of more than 15,360-bits are essential to obtain a security strength near to the AES-256. Currently, there is a drastic research direction in the wireless community on possible alternative/complementary approaches to secure wireless/wired communications. The proposed idea to achieve this goal, namely physical layer security (PLS), exploits the features of the wireless medium which facilitate the construction of novel security approaches.

This Research Topic aims to review scientific research in both theoretical and practical approaches to PLS, with the hope that the proposed PLS approaches can play a vital role in reducing both latency and complexity. The motivation of this collection is to include novel results in PLS and its potential application in communication systems, experimental and/or practical implementation results, as well as high quality tutorial publications. The focus of this publication is on the integration of PLS into actual systems and the potential advantages in securing new and upcoming systems, including, but not limited to, ultra-reliable low-latency communications (URLLC), Internet of Things (IoT), Optical communications (OC), near field communications (NFC), unmanned aerial vehicle (UAV) communications, underwater acoustic communication (UAC), and also wired communications such as power line communications (PLC), etc.

Topics of interest include but are not limited to:
• Information theoretic approaches
• Cooperative secure communications
• Covert communications and practical applications
• Security assessment and enhancement of PLS schemes in poor scattering environments
• Physical layer encryption (PLE)
• Cross-layer security mechanisms incorporating cryptography and physical layer solutions
• Physical layer secret key generation (SKG) over wireless (e.g., UAV, OC, UAC) and wired communications (e.g., optical fiber and PLC)
• Physical layer authentication and location verification
• Experimental results on practical implementations of PLS (especially SKG) techniques
• PLS in mmWave communications


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

In the recent years, with the emergence of quantum computing, the security of communications is vulnerable to key detection. On the other hand, ultra-low delays and targeting have become vital in a large group of upcoming applications in beyond 5G (B5G) systems and Internet-of-Things (IoT). Based on these facts, the increasing complexity and the required overhead of cryptographic designs may cause a challenge for B5G systems and IoT to connect everything (e.g., people, machines) together with very low latency. For example, NIST key management guidelines propose that the RSA keys lengths of more than 15,360-bits are essential to obtain a security strength near to the AES-256. Currently, there is a drastic research direction in the wireless community on possible alternative/complementary approaches to secure wireless/wired communications. The proposed idea to achieve this goal, namely physical layer security (PLS), exploits the features of the wireless medium which facilitate the construction of novel security approaches.

This Research Topic aims to review scientific research in both theoretical and practical approaches to PLS, with the hope that the proposed PLS approaches can play a vital role in reducing both latency and complexity. The motivation of this collection is to include novel results in PLS and its potential application in communication systems, experimental and/or practical implementation results, as well as high quality tutorial publications. The focus of this publication is on the integration of PLS into actual systems and the potential advantages in securing new and upcoming systems, including, but not limited to, ultra-reliable low-latency communications (URLLC), Internet of Things (IoT), Optical communications (OC), near field communications (NFC), unmanned aerial vehicle (UAV) communications, underwater acoustic communication (UAC), and also wired communications such as power line communications (PLC), etc.

Topics of interest include but are not limited to:
• Information theoretic approaches
• Cooperative secure communications
• Covert communications and practical applications
• Security assessment and enhancement of PLS schemes in poor scattering environments
• Physical layer encryption (PLE)
• Cross-layer security mechanisms incorporating cryptography and physical layer solutions
• Physical layer secret key generation (SKG) over wireless (e.g., UAV, OC, UAC) and wired communications (e.g., optical fiber and PLC)
• Physical layer authentication and location verification
• Experimental results on practical implementations of PLS (especially SKG) techniques
• PLS in mmWave communications


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

About Frontiers Research Topics

With their unique mixes of varied contributions from Original Research to Review Articles, Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author.

Topic Editors

Loading..

Submission Deadlines

08 August 2021 Abstract
06 December 2021 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..

Topic Editors

Loading..

Submission Deadlines

08 August 2021 Abstract
06 December 2021 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..
Loading..

total views article views article downloads topic views

}
 
Top countries
Top referring sites
Loading..