2021
DOI: 10.1016/j.csi.2021.103540
|View full text |Cite
|
Sign up to set email alerts
|

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 107 publications
0
3
0
Order By: Relevance
“…According to Skokowski et al (2022), this can be mitigated by coordinating the frequencies, but that may not be a viable option for truly private networks. On the other hand, this effect can be used as an extra layer of security by denying bad actors the access to the network, as argued by Li et al (2021). Enabling security and privacy using a private network is considered one of the key reasons for its adoption, as it se cures data transfer, confidential data collection, device management, operational management, monitoring, access management, and prioritization.…”
Section: State Of the Artmentioning
confidence: 99%
“…According to Skokowski et al (2022), this can be mitigated by coordinating the frequencies, but that may not be a viable option for truly private networks. On the other hand, this effect can be used as an extra layer of security by denying bad actors the access to the network, as argued by Li et al (2021). Enabling security and privacy using a private network is considered one of the key reasons for its adoption, as it se cures data transfer, confidential data collection, device management, operational management, monitoring, access management, and prioritization.…”
Section: State Of the Artmentioning
confidence: 99%
“…It satisfies the ultra-low latency requirement of the given network while maintaining its security and privacy [69]. Authors in [125] applied the friendly jamming technique, which is one of the promising PLS techniques, to prevent the data from getting decoded by Eves. RIS turns out to be a powerful hardware technology for the upcoming 6G networks due to the presence of many low-cost and passive reflecting elements.…”
Section: Uav Communication Systemmentioning
confidence: 99%
“…As a result, physical layer security has been proposed as an alternative to traditional cryptographic techniques to protect wireless communication systems regardless of eavesdropping capabilities [12]. This concept involves leveraging the probabilistic characteristics of radio channels (that is, noise, fading, and interference) to reduce the likelihood that information will be decoded by eavesdroppers [13], [14]. Thus, cooperative jammer has been regarded as one of the efficient physical layer security methods in which either an external helper or a communication device emits artificial or interfering noise to reduce the channel quality of the eavesdropper [15].…”
Section: Introductionmentioning
confidence: 99%