The next paradigm shift: from vehicular networks to vehicular clouds

S Olariu, T Hristov, G Yan - Mobile ad hoc networking: cutting …, 2013 - Wiley Online Library
… We fully expect that, once adopted, vehicular clouds will be the next paradigm shift with a …
related to security and privacy issues, Section 19.9 discusses a number of security and privacy …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… the PLA and Other Physical-Layer Security Techniques Besides the physical layer provides
a … , it also provides other security techniques, eg, the Physical Layer Security (PLS) and …

Paradigm shift of machine learning to deep learning in side channel attacks-A survey

M Shaikh, QA Arain, S Saddar - 2021 6th International Multi …, 2021 - ieeexplore.ieee.org
… Thus, a paradigm shift of ML to DL in SCAs is the focus of this paper. … paradigm shift
towards deep learning due to more accurate and precise results and also tightened in security

Technologies assisting the paradigm shift from 4g to 5g

J Parikh, A Basu - Wireless Personal Communications, 2020 - Springer
… Here we have improved security as data processing takes place close to the edge and not
… In this paper we have discussed the technologies which will cause a paradigm shift from 4G …

Internet of Things—A paradigm shift of future Internet applications

S Agrawal, ML Das - 2011 Nirma University International …, 2011 - ieeexplore.ieee.org
… the securitysecurity of the communication at this global level and privacy of the people and
“things” involved is one of the most important requirements of IoT. We discussed the security

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
… We discussed the 5G security paradigm through CIA 3 based analysis. We reviewed the
prevailing threats and solutions in 5G regarding each security fundamental element in CIA 3 . …

Wireless communication and security issues for cyber–physical systems and the Internet-of-Things

A Burg, A Chattopadhyay, KY Lam - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
security techniques, which are applied at the physical layer … tion security paradigm due to its
limited exposure to the physicalPhysical layer security measures are applied at the physical

[HTML][HTML] Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities

G Li, C Sun, J Zhang, E Jorswieck, B Xiao, A Hu - Entropy, 2019 - mdpi.com
Physical layer key generation has recently emerged as a new paradigm that provides a …
wireless networks will further stimulate physical layer-based security schemes and techniques. …

Reconfigurable intelligent surfaces-aided physical layer security enhancement in D2D underlay communications

MH Khoshafa, TMN Ngatched… - IEEE Communications …, 2020 - ieeexplore.ieee.org
… [6], physical layer security (PLS) has been developed as an appealing technique for enhancing
cellular network security … nication channels and noise to secure the data transmission by …

Internet of things (IoT): The next paradigm shift but whats the delay?

MS Zareen, M Tariq - 17th IEEE International Multi Topic …, 2014 - ieeexplore.ieee.org
… , the Internet of Things (IoT), a paradigm which is going to revolutionize every aspect of our
daily life. IoT is extension of internet from virtual world to the physical objects of real world [2]. …