[HTML][HTML] On the dependability of 6G networks
Sixth-generation communication networks must be highly dependable due to the foreseen
connectivity of critical infrastructures through them. Dependability is a compound metric of …
connectivity of critical infrastructures through them. Dependability is a compound metric of …
[HTML][HTML] Machine-learning-enabled intrusion detection system for cellular connected UAV networks
R Shrestha, A Omidkar, SA Roudi, R Abbas, S Kim - Electronics, 2021 - mdpi.com
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide
variety of applications in public and private sector from parcel delivery to wildlife …
variety of applications in public and private sector from parcel delivery to wildlife …
[HTML][HTML] 6G Mobile Networks: Key Technologies, Directions, and Advances
The exponential growth of the fifth-generation (5G) network gives businesses and
universities a chance to turn their attention to the next-generation network. It is widely …
universities a chance to turn their attention to the next-generation network. It is widely …
[HTML][HTML] Anomaly detection in 6G networks using machine learning methods
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …
[HTML][HTML] Business-Oriented Security Analysis of 6G for eHealth: An Impact Assessment Approach
Following the COVID-19 outbreak, the health sector is undergoing a deep transformation
that is increasingly pushing it towards the exploitation of technology, thus fostering the …
that is increasingly pushing it towards the exploitation of technology, thus fostering the …
[HTML][HTML] User-cell association for security and energy efficiency in ultra-dense heterogeneous networks
The last decades have been characterized by an exponential increase in digital services.
The demand is foreseen to further increase in the next years, and mobile networks will have …
The demand is foreseen to further increase in the next years, and mobile networks will have …
[HTML][HTML] AMSCN: A novel dual-task model for automatic modulation classification and specific emitter Identification
Specific emitter identification (SEI) and automatic modulation classification (AMC) are
generally two separate tasks in the field of radio monitoring. Both tasks have similarities in …
generally two separate tasks in the field of radio monitoring. Both tasks have similarities in …
Security and Trust in the 6G Era: Risks and Mitigations
The ubiquitous diffusion of connected devices in every context of the daily life of citizens,
public bodies, and companies is stimulating the creation of new applications that require …
public bodies, and companies is stimulating the creation of new applications that require …
[HTML][HTML] Intelligent Reflecting Surface–Assisted Wireless Secret Key Generation against Multiple Eavesdroppers
Y Liu, K Huang, X Sun, S Yang, L Wang - Entropy, 2022 - mdpi.com
In this paper, we propose an improved physical layer key generation scheme that can
maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the …
maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the …
[HTML][HTML] Implementation of efficient 5g aka protocol for light-weight environment
S Cho, C Yeom, Y Won - Sustainability, 2021 - mdpi.com
There is a critical vulnerability in the 5G AKA protocol of the 3GPP. We propose a protocol
that compensates for these vulnerabilities and speed up the existing protocol; and the study …
that compensates for these vulnerabilities and speed up the existing protocol; and the study …