2021
DOI: 10.1109/jsyst.2020.2990363
|View full text |Cite
|
Sign up to set email alerts
|

AR-Based Half-Duplex Attack in Beyond 5G Networks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…It is also relevant to discuss and be aware of possible threats (e.g., quantum attacks [Cho and Sergeev, 2021]) for B5G [El-Latif et al, 2020;Althobaiti and Dohler, 2020;Zenger et al, 2016;De Ree et al, 2019;Mucchi et al, 2021;Bong and Kim, 2022;Petrov et al, 2019;Macedo et al, 2020;Irram et al, 2020;Feng and Wang, 2021;Shu et al, 2020;Ghorbani et al, 2020;de Ree et al, 2020;Ahmad et al, 2022;Shafi and Kumar Jha, 2021;Xu et al, 2021;Siriwardhana et al, 2021;Lu et al, 2021;Li et al, 2021c;Zhu et al, 2021;Shen et al, 2021]. For instance, adversaries can maliciously take advantage of the high capabilities of quantum computing, which can be misused and, consequently, improperly access private data, for example, using insecure data transfer on IoT platforms.…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…It is also relevant to discuss and be aware of possible threats (e.g., quantum attacks [Cho and Sergeev, 2021]) for B5G [El-Latif et al, 2020;Althobaiti and Dohler, 2020;Zenger et al, 2016;De Ree et al, 2019;Mucchi et al, 2021;Bong and Kim, 2022;Petrov et al, 2019;Macedo et al, 2020;Irram et al, 2020;Feng and Wang, 2021;Shu et al, 2020;Ghorbani et al, 2020;de Ree et al, 2020;Ahmad et al, 2022;Shafi and Kumar Jha, 2021;Xu et al, 2021;Siriwardhana et al, 2021;Lu et al, 2021;Li et al, 2021c;Zhu et al, 2021;Shen et al, 2021]. For instance, adversaries can maliciously take advantage of the high capabilities of quantum computing, which can be misused and, consequently, improperly access private data, for example, using insecure data transfer on IoT platforms.…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…Half-duplex mode is considered in this work to avoid self-interference [19], [20] the time slot divided between the transmission and reception, therefore, the received radio frequency (RF) signal at first time slot š‘” 1 is:…”
Section: Proposed Modelmentioning
confidence: 99%