2018
DOI: 10.1109/mnet.2018.1700292
|View full text |Cite
|
Sign up to set email alerts
|

Dense-Device-Enabled Cooperative Networks for Efficient and Secure Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(26 citation statements)
references
References 13 publications
0
26
0
Order By: Relevance
“…Physical layer authentication has many advantages, such as low computational requirement and network overhead [6]- [8], but it also faces many challenges. The main reason is that most of the existing physical layer authentication techniques rely on static mechanisms while encountering the complex and dynamic wireless environment of 5G-and-beyond wireless networks.…”
Section: Challenges For Existing Physical Layer Authenticationmentioning
confidence: 99%
“…Physical layer authentication has many advantages, such as low computational requirement and network overhead [6]- [8], but it also faces many challenges. The main reason is that most of the existing physical layer authentication techniques rely on static mechanisms while encountering the complex and dynamic wireless environment of 5G-and-beyond wireless networks.…”
Section: Challenges For Existing Physical Layer Authenticationmentioning
confidence: 99%
“…The electromagnetic signal is transmitted by the millimeter wave base station and beamforming technology is used to reduce the interference of the clutter signal [15,16]. The reflected echo of the target is obtained by multipath reflection, and the location of UAV is transmitted through the data processing center [17,18]. Accurate identification and positioning are achieved in a timely manner.…”
Section: System Modelmentioning
confidence: 99%
“…To this end, the spectral efficiency and transmission latency shall be greatly improved and reduced, respectively, under massive connected devices. To fulfill these requirements, novel radio access technologies are required, such as novel multiple access (MA) technologies, network architectures, encoding, and modulation methods [3][4][5].…”
Section: Introductionmentioning
confidence: 99%