Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Physical layer security for visible light communication systems: A survey
Due to the dramatic increase in high data rate services and in order to meet the demands of
the fifth-generation (5G) networks, researchers from both academia and industry are …
the fifth-generation (5G) networks, researchers from both academia and industry are …
The security in optical wireless communication: A survey
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …
Communication (OWC) has attracted increasing attention in both research and the market. In …
Optimization or alignment: Secure primary transmission assisted by secondary networks
Security is a challenging issue for cognitive radio (CR) to be used in future 5G mobile
systems. Conventionally, interference will degrade the performance of a primary user (PU) …
systems. Conventionally, interference will degrade the performance of a primary user (PU) …
Physical layer security: Authentication, integrity, and confidentiality
The goal of physical layer security (PLS) is to make use of the properties of the physical
layer—including the wireless communication medium and/or the transceiver hardware—to …
layer—including the wireless communication medium and/or the transceiver hardware—to …
A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications
Unprecedented growth in wireless data traffic, and ever-increasing demand for highly
secured, and low-latency wireless communication has motivated the research community to …
secured, and low-latency wireless communication has motivated the research community to …
Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems
Millimeter wave (mmWave) vehicular communication systems will provide an abundance of
bandwidth for the exchange of raw sensor data and support driver-assisted and safety …
bandwidth for the exchange of raw sensor data and support driver-assisted and safety …