2019
DOI: 10.1109/access.2019.2925809
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer-Security-Oriented Frequency Allocation in Ultra-Dense-Networks Based on Location Informations

Abstract: In this paper, we investigate location-based frequency allocation schemes in a two-layer ultra-dense network (UDN) with a wideband eavesdropper to efficiently enhance the macro layer security in the whole working bandwidth. The cross-tier interference, treated as evil by traditional wisdom, is employed to confuse the malicious node as well as to tackle the conflict between the secrecy and traditional performances through the prudent spectrum allocation among the small cells. Three games are designed to progres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…show the applications of ML in enhancing the security of wireless systems. Among the most popular approaches are neural networks (NNs) and reinforcement learning [21], [30]- [34]. However, there are still some contributions considering other ML types to perform secure PHY transmission, for example, support vector machine (SVM) and Bayesian solutions [35].…”
Section: B Ml-aided Phy Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…show the applications of ML in enhancing the security of wireless systems. Among the most popular approaches are neural networks (NNs) and reinforcement learning [21], [30]- [34]. However, there are still some contributions considering other ML types to perform secure PHY transmission, for example, support vector machine (SVM) and Bayesian solutions [35].…”
Section: B Ml-aided Phy Securitymentioning
confidence: 99%
“…As another development, Li et al [32] design a Q-learningbased power control strategy for secure transmission by considering a powerful attacker having a high number of antennas. Upon using reinforcement learning, Xiao et al [33] propose an optimal beamforming scheme for visible light communication In [34], reinforcement learning is used by Miao and Wang to handle the frequency allocation problem without requiring any information exchange among base stations. In contrast to the above-mentioned papers, He et al [35] do not use NNs or reinforcement learning in designing secure transmissions.…”
Section: B Ml-aided Secure Phy Transmissionmentioning
confidence: 99%
See 1 more Smart Citation
“…As for ML-aided PHY security design, neural networks and reinforcement learning constitute the most popular approaches [17], [26]- [30]. Having said that, there are some contributions considering the potential use of other ML types, for example, support vector machine (SVM) and naive Bayesian solutions [31].…”
Section: B Ml-based Physical Layer Securitymentioning
confidence: 99%
“…He et al [26] exploit both beamforming and artificial noise [28] design a Q-learning-based power control strategy for secure transmission by considering a powerful attacker having a high number of antennas. Upon using reinforcement learning, Xiao et al [29] propose an optimal beamforming scheme for visible light communication In [30], reinforcement learning is used by Miao and Wang to handle the frequency allocation problem without requiring any information exchange among base stations. In contrast to the above-mentioned papers, He et al [31] do not use neural networks or reinforcement learning in designing secure transmissions.…”
Section: B Recent Advances and Future Directionsmentioning
confidence: 99%