2019
DOI: 10.1109/tnet.2019.2911126
|View full text |Cite
|
Sign up to set email alerts
|

Intrinsic Secrecy in Inhomogeneous Stochastic Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 66 publications
0
4
0
Order By: Relevance
“…The large amount of the world data collected by networks of sensors (environmental, human-body, etc.) and the mobility features of most scenarios ask for advanced security techniques that take into account new constraints in terms of device capabilities, network environment and network dynamic topology [33]. PLS, moving the security strategy at physical layer, might be one of the confidentiality enablers in 6G connectivity.…”
Section: A Pls For Low-resourced Devicesmentioning
confidence: 99%
“…The large amount of the world data collected by networks of sensors (environmental, human-body, etc.) and the mobility features of most scenarios ask for advanced security techniques that take into account new constraints in terms of device capabilities, network environment and network dynamic topology [33]. PLS, moving the security strategy at physical layer, might be one of the confidentiality enablers in 6G connectivity.…”
Section: A Pls For Low-resourced Devicesmentioning
confidence: 99%
“…In [19], subchannel assignment and power allocation are jointly analyzed to maximize secrecy performance in a two tier HCN. Chisci et al discussed intrinsic secrecy in a inhomogeneously spatial distributed heterogeneous network [20]. While these works provide valuable insights on secrecy performance in HCNs, the common assumptions are that users are assigned to strongest BSs(referred to as max-SINR association hereinafter), and eavesdroppers are of a single type: they are noncolluding and are overhearing all legitimate transmissions at all times.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The large amount of the world data collected by networks of sensors (environmental, human-body, etc.) and the mobility features of most scenarios ask for advanced security techniques that take into account new constraints in terms of device capabilities, network environment and network dynamic topology [34]. PLS, moving the security strategy at physical layer, might be one of the confidentiality enablers in 6G connectivity.…”
Section: A Pls For Low-resourced Devicesmentioning
confidence: 99%