2023
DOI: 10.1109/comst.2022.3224279
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(11 citation statements)
references
References 198 publications
0
11
0
Order By: Relevance
“…The radio broadcasts are more vulnerable due to the open wireless air interface for the communications environment. Physical layer secrecy is based on information-theoretic principles and takes advantage of physical propagation characteristics, such as interference, fading, and noise, to protect the confidentiality of the transmission in the face of the threat posed by the development of powerful computing technologies that can be realized through cryptographic encryption [33].…”
Section: Potential Research Challenges and Opportunitiesmentioning
confidence: 99%
“…The radio broadcasts are more vulnerable due to the open wireless air interface for the communications environment. Physical layer secrecy is based on information-theoretic principles and takes advantage of physical propagation characteristics, such as interference, fading, and noise, to protect the confidentiality of the transmission in the face of the threat posed by the development of powerful computing technologies that can be realized through cryptographic encryption [33].…”
Section: Potential Research Challenges and Opportunitiesmentioning
confidence: 99%
“…Many schemes have been proposed to secure the transmission, among which the physical layer security (PLS) achieves the confidentiality of the communication by exploiting the stochastic time-varying properties of the channel [2][3][4][5][6]. In contrast to traditional cryptography techniques, physical layer security techniques do not require any additional security schemes or algorithms to be implemented in other layers above the physical layer [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Common PLS techniques include beamforming [ 9 ], artificial noise [ 10 ], and relay selection [ 11 ]. The principle of beamforming is to achieve the directional transmission of signals by adjusting the transmission direction of the antennas to achieve PLS [ 12 ].…”
Section: Introductionmentioning
confidence: 99%