Enabling intelligent connectivity: A survey of secure isac in 6g networks

X Zhu, J Liu, L Lu, T Zhang, T Qiu… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The rapid growth of intelligent sensing capabilities and super computation power in 6G
mobile communication systems has facilitated their application in diverse domains such as …

Safeguarding next-generation multiple access using physical layer security techniques: A tutorial

L Lv, D Xu, RQ Hu, Y Ye, L Yang, X Lei… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultralow latency,
and massive connectivity, the forefront of wireless research calls for the design of advanced …

[PDF][PDF] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering …, 2023 - pdfs.semanticscholar.org
The security issues surrounding cloud computing, a quickly develo** technology that is
now essential to both personal and business computing, are thoroughly examined in this …

[HTML][HTML] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks

OA Khashan - Knowledge-Based Systems, 2024 - Elsevier
In wireless sensor networks (WSNs), the presence of malicious nodes (MNs) poses
significant challenges to data integrity, network stability, and system reliability. These issues …

A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

Z Lai, Z Chang, M Sha, Q Zhang, N **e, C Chen… - ACM Computing …, 2025 - dl.acm.org
The open and broadcast nature of wireless mediums introduces significant security
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …

Enhancing physical layer security with reconfigurable intelligent surfaces and friendly jamming: A secrecy analysis

E Illi, M Qaraqe, F El Bouanani, S Al-Kuwari - Computer Communications, 2024 - Elsevier
Despite its numerous advantages in enhancing wireless systems' reliability and secrecy
performance, the implementation of reconfigurable intelligent surfaces (RIS) is faced with …

A Novel PHY-layer Spoofing Attack Detection Scheme based on WGAN-Encoder Model

W **e, H Wang, Z Feng, C Ma - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
PHY-layer spoofing attack is a potential critical issue in wireless network communication
security, which could lead to catastrophic consequences for critical mission and …

One Friendly UAV against Multiple Mobile Eves in HAP Networks: A Novel Physical Layer Secure Communication Scheme

Y Zhang, Z Na, W Lu, C Ji - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
High altitude platforms (HAPs) are emerging as the critical enabler for the next generation
communication system, due to their broad coverage, long endurance and high payload …

On the physical layer security of underwater optical wireless communication networks

E Illi, M Qaraqe - IEEE Journal of Oceanic Engineering, 2024 - ieeexplore.ieee.org
This article deals with the secrecy analysis of an underwater optical wireless communication
(UOWC) system operating under the presence of underwater turbulence and geometric path …

Enhancing IoT Security with Trust Management Using Ensemble XGBoost and AdaBoost Techniques

KA Awan, IU Din, A Almogren, BS Kim… - IEEE Access, 2024 - ieeexplore.ieee.org
As next-generation networking environments become increasingly complex and integral to
the fabric of digital transformation as the traditional perimeter-based security model proves …