Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Security for 5G and beyond
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …
connect almost all aspects of life through the network with much higher speed, very low …
Joint secure offloading and resource allocation for vehicular edge computing network: A multi-agent deep reinforcement learning approach
The mobile edge computing (MEC) technology can simultaneously provide high-speed
computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) …
computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) …
Robust and secure wireless communications via intelligent reflecting surfaces
In this paper, intelligent reflecting surfaces (IRSs) are employed to enhance the physical
layer security in a challenging radio environment. In particular, a multi-antenna access point …
layer security in a challenging radio environment. In particular, a multi-antenna access point …
Massive access for 5G and beyond
Massive access, also known as massive connectivity or massive machine-type
communication (mMTC), is one of the main use cases of the fifth-generation (5G) and …
communication (mMTC), is one of the main use cases of the fifth-generation (5G) and …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities
N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …
increasing demands of the future Internet of Things (IoT) networks. For wireless …
Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint
This work examines the performance gain achieved by deploying an intelligent reflecting
surface (IRS) in covert communications. To this end, we formulate the joint design of the …
surface (IRS) in covert communications. To this end, we formulate the joint design of the …
A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
Interplay between NOMA and other emerging technologies: A survey
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …