About this Research Topic
In the recent years, with the emergence of quantum computing, the security of communications is vulnerable to key detection. On the other hand, ultra-low delays and targeting have become vital in a large group of upcoming applications in beyond 5G (B5G) systems and Internet-of-Things (IoT). Based on these facts, the increasing complexity and the required overhead of cryptographic designs may cause a challenge for B5G systems and IoT to connect everything (e.g., people, machines) together with very low latency. For example, NIST key management guidelines propose that the RSA keys lengths of more than 15,360-bits are essential to obtain a security strength near to the AES-256. Currently, there is a drastic research direction in the wireless community on possible alternative/complementary approaches to secure wireless/wired communications. The proposed idea to achieve this goal, namely physical layer security (PLS), exploits the features of the wireless medium which facilitate the construction of novel security approaches.
This Research Topic aims to review scientific research in both theoretical and practical approaches to PLS, with the hope that the proposed PLS approaches can play a vital role in reducing both latency and complexity. The motivation of this collection is to include novel results in PLS and its potential application in communication systems, experimental and/or practical implementation results, as well as high quality tutorial publications. The focus of this publication is on the integration of PLS into actual systems and the potential advantages in securing new and upcoming systems, including, but not limited to, ultra-reliable low-latency communications (URLLC), Internet of Things (IoT), Optical communications (OC), near field communications (NFC), unmanned aerial vehicle (UAV) communications, underwater acoustic communication (UAC), and also wired communications such as power line communications (PLC), etc.
Topics of interest include but are not limited to:
• Information theoretic approaches
• Cooperative secure communications
• Covert communications and practical applications
• Security assessment and enhancement of PLS schemes in poor scattering environments
• Physical layer encryption (PLE)
• Cross-layer security mechanisms incorporating cryptography and physical layer solutions
• Physical layer secret key generation (SKG) over wireless (e.g., UAV, OC, UAC) and wired communications (e.g., optical fiber and PLC)
• Physical layer authentication and location verification
• Experimental results on practical implementations of PLS (especially SKG) techniques
• PLS in mmWave communications
Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.