Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Wireless backhaul in 5G and beyond: Issues, challenges and opportunities

B Tezergil, E Onur - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With the introduction of new technologies such as Unmanned Aerial Vehicle (UAV), High
Altitude Platform Station (HAPS), Millimeter Wave (mmWave) frequencies, Massive Multiple …

Physical-layer authentication for ambient backscatter-aided NOMA symbiotic systems

X Li, Q Wang, M Zeng, Y Liu, S Dang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA)
are two promising technologies for the future wireless communication networks owing to …

Physical-layer authentication using multiple channel-based features

N Xie, J Chen, L Huang - IEEE transactions on information …, 2021 - ieeexplore.ieee.org
This paper concerns the problem of authenticating the transmitter without a secret key. In
comparison with traditional cryptographic-based authentication mechanisms, the Physical …

Adaptive physical layer authentication using machine learning with antenna diversity

M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …

BCAuth: Physical layer enhanced authentication and attack tracing for backscatter communications

P Wang, Z Yan, K Zeng - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Backscatter communication (BC) enables ultra-low-power communications and allows
devices to harvest energy simultaneously. But its practical deployment faces severe security …

Intelligent and secure radio environments for 6G vehicular aided HetNets: Key opportunities and challenges

WU Khan, MA Javed, S Zeadally, E Lagunas… - arXiv preprint arXiv …, 2022 - arxiv.org
Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to
enable intelligent wireless environments. Due to the low cost, improved efficiency, and …

Scalable secret key generation for wireless sensor networks

U Altun, ST Basaran, GK Kurt… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Future sensor networks require energy and bandwidth efficient designs to support the
growing number of nodes. The security aspect is often neglected due to the extra …

Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders

TM Hoang, T Van Chien, T Van Luong… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the
presence of a spoofer. The aggregated signal received by the terrestrial base station is …