2019
DOI: 10.1109/mnet.001.1700412
|View full text |Cite
|
Sign up to set email alerts
|

Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…By using mmWave in private or public office buildings, it is possible to prevent leakage of information outside the building. [144]. Alquhayz et al implemented a policy-based security management system to ensure that end-user devices cannot be used as weapons or tools of attack.…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%
“…By using mmWave in private or public office buildings, it is possible to prevent leakage of information outside the building. [144]. Alquhayz et al implemented a policy-based security management system to ensure that end-user devices cannot be used as weapons or tools of attack.…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%
“…For our simulations, we assumed the ideal Rayleigh fading channel model as described in Section II. [1,21,24,25] for R = 6, and [1,35,41,119…”
Section: Performance Comparisonsmentioning
confidence: 99%
“…The information-theoretic foundation of secret-key agreement in public channels was first established by Maurer and Wolf [20][21][22]. Most of secret-key agreement or generation methods require the assumptions of time division duplex (TDD) channel reciprocity and near-perfect CSI [23][24][25]. The strong assumptions on CSI have hindered the industrial applications of PLS [26].…”
Section: Introductionmentioning
confidence: 99%
“…16 Exploiting the dynamics in the physical layer, physical layer security has recently shown to support secure transmissions and emerged as an appealing method to provide perfect secrecy. [17][18][19][20] In the context of cooperative NOMA, physical layer security has attracted increasing research interests. [21][22][23][24][25][26] In the work of Vo et al, 21 the authors considered imperfect channel state information (CSI) and analyzed the secrecy and throughput of a cooperative NOMA energy harvesting IoT system in the presence of untrust relays.…”
Section: Introductionmentioning
confidence: 99%