Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey

H Sharma, N Kumar - Physical Communication, 2023 - Elsevier
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …

Smart jamming attacks in 5G new radio: A review

Y Arjoune, S Faruque - 2020 10th annual computing and …, 2020 - ieeexplore.ieee.org
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …

Learning k for kNN Classification

S Zhang, X Li, M Zong, X Zhu, D Cheng - ACM Transactions on …, 2017 - dl.acm.org
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …

Jamming and anti–jamming techniques in wireless networks: a survey

K Grover, A Lim, Q Yang - International Journal of Ad Hoc …, 2014 - inderscienceonline.com
Because of the proliferation of wireless technologies, jamming in wireless networks has
become a major research problem due to the ease in blocking communication in wireless …

Short paper: Reactive jamming in wireless networks: How realistic is the threat?

M Wilhelm, I Martinovic, JB Schmitt… - Proceedings of the fourth …, 2011 - dl.acm.org
In this work, we take on the role of a wireless adversary and investigate one of its most
powerful tools---radio frequency jamming. Although different jammer designs are discussed …

A statistical approach to detect jamming attacks in wireless sensor networks

O Osanaiye, AS Alfa, GP Hancke - Sensors, 2018 - mdpi.com
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising
network solutions with a wide variety of applications in the areas of agriculture, environment …

Jamming detection in low-ber mobile indoor scenarios via deep learning

S Sciancalepore, F Kusters… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The current state of the art on jamming detection relies on link-layer metrics. A few examples
are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …

Jamming resilient communication using MIMO interference cancellation

Q Yan, H Zeng, T Jiang, M Li, W Lou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Jamming attack is a serious threat to the wireless communications. Reactive jamming
maximizes the attack efficiency by jamming only when the targets are communicating, which …

Physical layer wireless security made fast and channel independent

S Gollakota, D Katabi - 2011 Proceedings IEEE INFOCOM, 2011 - ieeexplore.ieee.org
There is a growing interest in physical layer security. Recent work has demonstrated that
wireless devices can generate a shared secret key by exploiting variations in their channel …

Detection of reactive jamming in DSSS-based wireless communications

M Spuhler, D Giustiniano, V Lenders… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Reactive jammers have been shown to be a serious threat for wireless communication.
Despite this, it is difficult to detect their presence reliably. We propose a novel method to …