Active reconfigurable intelligent surfaces: Expanding the frontiers of wireless communication-a survey
The swift progress of metasurface technology, enabling meticulous manipulation of the
propagation environment, is anticipated to bring a transformative impact on sixth-generation …
propagation environment, is anticipated to bring a transformative impact on sixth-generation …
Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …
performance of future 5G networks, which promises to fulfill the demands of increasing user …
Coalition game and blockchain-based optimal data pricing scheme for ride sharing beyond 5g
This article proposes a blockchain and coalition game theory-based secure and reliable
optimal data pricing scheme for ride sharing. It mainly focuses on securing data sharing …
optimal data pricing scheme for ride sharing. It mainly focuses on securing data sharing …
[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks
Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses
because of their high mobility and adaptable deployment capabilities in open spaces. They …
because of their high mobility and adaptable deployment capabilities in open spaces. They …
Federated learning empowered end-edge-cloud cooperation for 5G HetNet security
The distributed and heterogeneous framework in the 5G heterogeneous network (Het-Net)
makes it vulnerable to attacks of different kinds. Nodes for improving the network security are …
makes it vulnerable to attacks of different kinds. Nodes for improving the network security are …
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
MMI Khan, G Nencioni - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, there has been a trend to integrate networking and computing systems,
whose management is getting increasingly complex. Resource allocation is one of the …
whose management is getting increasingly complex. Resource allocation is one of the …
A zero-sum game-based secure and interference mitigation scheme for socially aware D2D communication with imperfect CSI
Device-to-device (D2D) communication is the most evolving technology in fifth-generation
(5G) networks. It allows direct communication of devices in the proximity-with or without the …
(5G) networks. It allows direct communication of devices in the proximity-with or without the …
Secure computation offloading for device-collaborative mec networks: A drl-based approach
This paper investigates secure computation offloading in device-collaborative mobile edge
computing (MEC) networks, where mobile users (MUs) can process a part of their tasks …
computing (MEC) networks, where mobile users (MUs) can process a part of their tasks …
D2D-enabled resource management in secrecy-ensured 5G and beyond heterogeneous networks
Abstract Integration of Device-to-Device communication in 5G Heterogeneous networks
(HetNets) promises to increase resource utilization and spectrum efficiency (SE). However …
(HetNets) promises to increase resource utilization and spectrum efficiency (SE). However …
A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning
Densification of networks through heterogeneous cells deployment is considered a key
technology to satisfy the huge traffic growth in future wireless systems. In addition to …
technology to satisfy the huge traffic growth in future wireless systems. In addition to …