2022
DOI: 10.3390/s22093589
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

Abstract: With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 203 publications
0
4
0
Order By: Relevance
“…Resource allocation problems have been extensively studied in the literature for multi-cell wireless systems [ 2 , 16 , 17 , 18 ]. For this setting, optimally allocating the power control and user scheduling is essential to improve the achievable sum-rate performance [ 19 , 20 ]. While most of these studies use iterative approaches to maximize the overall system throughput, the optimization problems are non-convex due to the nonlinear probabilistic constraints [ 21 ].…”
Section: Related Workmentioning
confidence: 99%
“…Resource allocation problems have been extensively studied in the literature for multi-cell wireless systems [ 2 , 16 , 17 , 18 ]. For this setting, optimally allocating the power control and user scheduling is essential to improve the achievable sum-rate performance [ 19 , 20 ]. While most of these studies use iterative approaches to maximize the overall system throughput, the optimization problems are non-convex due to the nonlinear probabilistic constraints [ 21 ].…”
Section: Related Workmentioning
confidence: 99%
“…The issue of wireless network security has become a prominent research focus, as users' confidential information is vulnerable to eavesdropping in wireless network channels. Based on information security theory, physical layer security (PLS) technology has emerged as a practical solution [8,9]. In recent studies [10,11], the security communication concerns in CR-NOMA networks have been investigated from the PLS perspective.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Physical Layer Authentication (PLA) has been commonly combined with machine learning (ML) algorithms for device authentication. PLA can be categorized into various research directions based on the sources of authentication evidence [4], among which the schemes based on hardware components characteristics and the schemes based on channel characteristics are the most representative approaches. Hardware-based methods use hardware features of devices to verify UE's identity [5].…”
Section: Introductionmentioning
confidence: 99%