A survey on space-air-ground-sea integrated network security in 6G

H Guo, J Li, J Liu, N Tian, N Kato - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Space-air-ground-sea integrated network (SAGSIN), which integrates satellite
communication networks, aerial networks, terrestrial networks, and marine communication …

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks

P Kumar, A Baliyan, KR Prasad… - Wireless …, 2022 - Wiley Online Library
A number of disadvantages of traditional networks may be attributed to the close relationship
that exists between the control plane and the data plane inside proprietary hardware …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L ** networks
J Qin, M Li, L Shi, X Yu - IEEE Transactions on Automatic …, 2017 - ieeexplore.ieee.org
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …