Survey on multi-access edge computing security and privacy
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
Security for 5G and beyond
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …
connect almost all aspects of life through the network with much higher speed, very low …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Trustworthiness in industrial IoT systems based on artificial intelligence
Z Lv, Y Han, AK Singh, G Manogaran… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The intelligent industrial environment developed with the support of the new generation
network cyber-physical system (CPS) can realize the high concentration of information …
network cyber-physical system (CPS) can realize the high concentration of information …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Security for 5G mobile wireless networks
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …
requirements and challenges. This paper presents a comprehensive study on the security of …
Caching UAV assisted secure transmission in hyper-dense networks based on interference alignment
Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via
wireless backhaul to improve coverage and increase rate. However, the capacity of …
wireless backhaul to improve coverage and increase rate. However, the capacity of …
New trends in stochastic geometry for wireless networks: A tutorial and survey
Next-generation wireless networks are expected to be highly heterogeneous, multilayered,
with embedded intelligence at both the core and edge of the network. In such a context …
with embedded intelligence at both the core and edge of the network. In such a context …
5G, 6G, and Beyond: Recent advances and future challenges
F Salahdine, T Han, N Zhang - Annals of Telecommunications, 2023 - Springer
With the high demand for advanced services and the increase in the number of connected
devices, current wireless communication systems are required to expand to meet the users' …
devices, current wireless communication systems are required to expand to meet the users' …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …