Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Joint secure offloading and resource allocation for vehicular edge computing network: A multi-agent deep reinforcement learning approach

Y Ju, Y Chen, Z Cao, L Liu, Q Pei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The mobile edge computing (MEC) technology can simultaneously provide high-speed
computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) …

Robust and secure wireless communications via intelligent reflecting surfaces

X Yu, D Xu, Y Sun, DWK Ng… - IEEE Journal on Selected …, 2020 - ieeexplore.ieee.org
In this paper, intelligent reflecting surfaces (IRSs) are employed to enhance the physical
layer security in a challenging radio environment. In particular, a multi-antenna access point …

Massive access for 5G and beyond

X Chen, DWK Ng, W Yu, EG Larsson… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Massive access, also known as massive connectivity or massive machine-type
communication (mMTC), is one of the main use cases of the fifth-generation (5G) and …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint

X Zhou, S Yan, Q Wu, F Shu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines the performance gain achieved by deploying an intelligent reflecting
surface (IRS) in covert communications. To this end, we formulate the joint design of the …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Interplay between NOMA and other emerging technologies: A survey

M Vaezi, GAA Baduge, Y Liu, A Arafa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …