A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

A survey on space-air-ground-sea integrated network security in 6G

H Guo, J Li, J Liu, N Tian, N Kato - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Space-air-ground-sea integrated network (SAGSIN), which integrates satellite
communication networks, aerial networks, terrestrial networks, and marine communication …

Well-architected wireless network security

AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …

Covert communications: A comprehensive survey

X Chen, J An, Z **ong, C **ng, N Zhao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …

A tutorial on extremely large-scale MIMO for 6G: Fundamentals, signal processing, and applications

Z Wang, J Zhang, H Du, D Niyato, S Cui… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers vast spatial
degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth …

Enabling joint communication and radar sensing in mobile networks—A survey

JA Zhang, ML Rahman, K Wu, X Huang… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Mobile network is evolving from a communication-only network towards one with joint
communication and radar/radio sensing (JCAS) capabilities, that we call perceptive mobile …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C **ao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Evaluating critical security issues of the IoT world: Present and future challenges

M Frustaci, P Pace, G Aloi… - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
Social Internet of Things (SIoT) is a new paradigm where Internet of Things (IoT) merges
with social networks, allowing people and devices to interact, and facilitating information …