2021
DOI: 10.1109/jiot.2021.3071591
|View full text |Cite
|
Sign up to set email alerts
|

On the Secure Spectral Efficiency of URLLC With Randomly Located Colluding Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…Despite the improved coexistence provided by the detect and avoid (DAA) mechanism, collisions between competing wireless nodes and networks are still possible. A medium sense, in addition to collisions, introduces latency and non-determinism as a result of medium congestion [192]. The aforementioned facts greatly limit the use of wireless solutions for closed-loop control applications in the automation industry.…”
Section: A Performance Trade-off Between Urllc and Embbmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite the improved coexistence provided by the detect and avoid (DAA) mechanism, collisions between competing wireless nodes and networks are still possible. A medium sense, in addition to collisions, introduces latency and non-determinism as a result of medium congestion [192]. The aforementioned facts greatly limit the use of wireless solutions for closed-loop control applications in the automation industry.…”
Section: A Performance Trade-off Between Urllc and Embbmentioning
confidence: 99%
“…commercial networks of 802.15.4 in B5G-IIoT exclude forward error correction (FEC) due to energy consumption in the decoding process. However, adopting FEC should lower overall energy consumption because less energy is wasted on retransmissions and rescheduling [192] and latency can be addressed as a function of frame size. However, MAC configuration has a significant impact on energy consumption because it specifies scheduling and, as a result, radio on and off instances [195].…”
Section: A Performance Trade-off Between Urllc and Embbmentioning
confidence: 99%
“…The authors in [ 9 ] considered a multiuser downlink network in the presence of an eavesdropper and developed efficient methods to solve the total transmit power minimization and weighted throughput maximization problems. Packet replication and interface diversity schemes were employed in [ 14 ] to improve the secure spectral efficiency, where eavesdroppers are randomly distributed according to Poisson point processes. In [ 15 ], the spectrum sensing blocklength and transmission blocklength were jointly optimized to maximize the secrecy throughput.…”
Section: Introductionmentioning
confidence: 99%
“…Conventionally, security for IoT is addressed by cryptographic techniques. The encryptionbased security techniques have inherent high complexity in secret key generation, distribution, and management, which makes it difficult to apply for IoT networks with many resource-constrained sensors and actuators [6][7][8].…”
Section: Introductionmentioning
confidence: 99%