2019
DOI: 10.1109/jiot.2019.2927379
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
141
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 298 publications
(142 citation statements)
references
References 98 publications
0
141
0
1
Order By: Relevance
“…and M (21) 10 ). In the proposed protocol, it is difficult for the intrusion IoT device to obtain authentication samples because cryptography-based authentication is performed selectively with low probability (Section IV.B), which means that the proposed protocol is secure against other intelligent attacks (e.g., replay and DoS attacks) for cryptography-based authentication.…”
Section: ) Brute-force Attacksmentioning
confidence: 95%
See 1 more Smart Citation
“…and M (21) 10 ). In the proposed protocol, it is difficult for the intrusion IoT device to obtain authentication samples because cryptography-based authentication is performed selectively with low probability (Section IV.B), which means that the proposed protocol is secure against other intelligent attacks (e.g., replay and DoS attacks) for cryptography-based authentication.…”
Section: ) Brute-force Attacksmentioning
confidence: 95%
“…Alternatively, physical layer authentication (PLA), which enables fast and lightweight authentication by exploiting physical characteristics (e.g., channel, and carrier frequency offset (CFO)) for authentication, has attracted attention as an authentication solution for IoT devices due to its efficiency and effectiveness [20], [21]. PLA can be divided into two cases, i.e., PLA without a shared PHY secret key and PLA with a shared PHY secret key, according to the purpose of the exploited physical layer (PHY) features.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, enabling network slicing for multiple tenants with distinct requirements using a wide variety of physical infrastructures through SDN and NFV involves different networks. Enabling network slicing suffers from serious security concerns, including multi-domain security, such as edge computing security [64], cloud security [65], telecommunication networks security, and IoT networks security [66].…”
Section: F Securitymentioning
confidence: 99%
“…Security solutions for 5G networks at physical layer are probably the most reported technologies. Although, as previously said, most works are analyzing the security threats, challenges and opportunities [ 44 , 45 , 46 ]; some specific technologies have been reported. In particular, technologies based on different channel estimators to prevent spoofing attacks in the wireless media have been described [ 47 ].…”
Section: State Of the Art On 5g Security Solutions And C-ran Solutmentioning
confidence: 99%