Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Reconfigurable intelligent surfaces: Principles and opportunities

Y Liu, X Liu, X Mu, T Hou, J Xu… - … surveys & tutorials, 2021 - ieeexplore.ieee.org
Reconfigurable intelligent surfaces (RISs), also known as intelligent reflecting surfaces
(IRSs), or large intelligent surfaces (LISs), 1 have received significant attention for their …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art

QV Pham, F Fang, VN Ha, MJ Piran, M Le, LB Le… - IEEE …, 2020 - ieeexplore.ieee.org
Driven by the emergence of new compute-intensive applications and the vision of the
Internet of Things (IoT), it is foreseen that the emerging 5G network will face an …

Covert mmWave communications with finite blocklength against spatially random wardens

R Ma, W Yang, X Guan, X Lu, Y Song… - IEEE internet of things …, 2023 - ieeexplore.ieee.org
In this article, we investigate covert millimeter-wave (mmWave) communications with finite
blocklength, where a multiantenna transmitter sends covert messages to a legitimate …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A systematic review on NOMA variants for 5G and beyond

I Budhiraja, N Kumar, S Tyagi, S Tanwar, Z Han… - IEEE …, 2021 - ieeexplore.ieee.org
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …

Exploiting intelligent reflecting surfaces in NOMA networks: Joint beamforming optimization

X Mu, Y Liu, L Guo, J Lin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates a downlink multiple-input single-output intelligent reflecting surface
(IRS) aided non-orthogonal multiple access (NOMA) system, where a base station (BS) …

A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends

Z Ding, X Lei, GK Karagiannidis… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth-
generation (5G) wireless networks to meet the heterogeneous demands on low latency, high …