Active reconfigurable intelligent surfaces: Expanding the frontiers of wireless communication-a survey

M Ahmed, S Raza, AA Soofi, F Khan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The swift progress of metasurface technology, enabling meticulous manipulation of the
propagation environment, is anticipated to bring a transformative impact on sixth-generation …

Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - Journal of Network and Computer …, 2022 - Elsevier
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …

Coalition game and blockchain-based optimal data pricing scheme for ride sharing beyond 5g

R Kakkar, R Gupta, S Tanwar… - IEEE Systems …, 2021 - ieeexplore.ieee.org
This article proposes a blockchain and coalition game theory-based secure and reliable
optimal data pricing scheme for ride sharing. It mainly focuses on securing data sharing …

[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks

F Xu, S Ahmad, M Ahmed, S Raza, F Khan, Y Ma… - Journal of King Saud …, 2023 - Elsevier
Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses
because of their high mobility and adaptable deployment capabilities in open spaces. They …

Federated learning empowered end-edge-cloud cooperation for 5G HetNet security

Y Wei, S Zhou, S Leng, S Maharjan, Y Zhang - IEEE Network, 2021 - ieeexplore.ieee.org
The distributed and heterogeneous framework in the 5G heterogeneous network (Het-Net)
makes it vulnerable to attacks of different kinds. Nodes for improving the network security are …

Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective

MMI Khan, G Nencioni - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, there has been a trend to integrate networking and computing systems,
whose management is getting increasingly complex. Resource allocation is one of the …

A zero-sum game-based secure and interference mitigation scheme for socially aware D2D communication with imperfect CSI

R Gupta, S Tanwar - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
Device-to-device (D2D) communication is the most evolving technology in fifth-generation
(5G) networks. It allows direct communication of devices in the proximity-with or without the …

Secure computation offloading for device-collaborative mec networks: A drl-based approach

M Sun, X Xu, S Han, H Zheng, X Tao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates secure computation offloading in device-collaborative mobile edge
computing (MEC) networks, where mobile users (MUs) can process a part of their tasks …

D2D-enabled resource management in secrecy-ensured 5G and beyond heterogeneous networks

F Irrum, M Ali, M Naeem, A Anpalagan, S Qaisar… - Physical …, 2021 - Elsevier
Abstract Integration of Device-to-Device communication in 5G Heterogeneous networks
(HetNets) promises to increase resource utilization and spectrum efficiency (SE). However …

A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning

D Marabissi, A Abrardo, L Mucchi - Mobile Networks and Applications, 2023 - Springer
Densification of networks through heterogeneous cells deployment is considered a key
technology to satisfy the huge traffic growth in future wireless systems. In addition to …