Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - Journal of Network and Computer …, 2022 - Elsevier
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …

Multiagent deep-reinforcement-learning-based virtual resource allocation through network function virtualization in Internet of Things

HA Shah, L Zhao - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Resource allocation is a significant task in the emerging area of Internet of Things (IoT). IoT
devices are usually low-cost devices with limited computational power and capabilities for …

URJA: Usage jammer as a resource allocation for secure transmission in a CR-NOMA-based 5G femtocell system

I Budhiraja, N Kumar, S Tyagi, S Tanwar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In this article, a joint user pairing and secure resource allocation scheme for cognitive radio
inspired nonorthogonal multiple access (CR-NOMA) femtocells in the presence of a jammer …

[HTML][HTML] Energy-efficient markov-based lifetime enhancement approach for underwater acoustic sensor network

V Sivakumar, GR Kanagachidambaresan… - Journal of …, 2022 - hindawi.com
The multihop underwater acoustic sensor network (M-UASN) collects oceanographic data at
different depths. Due to the harsh underwater environment, the route is a major research …

SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks

R Dubey, PK Mishra, S Pandey - Journal of Network and Systems …, 2023 - Springer
The radio-cast nature of wireless communications is always exposed to the eavesdropping
attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) …

Physical layer security for 5G wireless networks: A comprehensive survey

JDV Sánchez, L Urquiza-Aguiar… - 2019 3rd cyber …, 2019 - ieeexplore.ieee.org
Physical-layer security is emerging approach that can benefit conventional encryption
methods. The main idea of physical layer security is to take advantage of the features of the …

[HTML][HTML] A Trust framework to detect malicious nodes in cognitive radio networks

G Rathee, F Ahmad, CA Kerrache, MA Azad - Electronics, 2019 - mdpi.com
Cognitive radio is considered as a pioneering technique in the domain of wireless
communication as it enables and permits the Cognitive Users (CU) to exploit the unused …

Throughput maximization for underlay CR multicarrier NOMA network with cooperative communication

T Manimekalai, S Romera Joan, T Laxmikandan - ETRI Journal, 2020 - Wiley Online Library
The non‐orthogonal multiple access (NOMA) technique offers throughput improvement to
meet the demands of the future generation of wireless communication networks. The …

Carrier frequency offset (CFO) synchronization and peak average power ratio (PAPR) minimization for energy efficient cognitive radio network (CRN) for 5G wireless …

T Balachander, MBM Krishnan - Wireless Personal Communications, 2022 - Springer
In the recent past, the Cognitive Radio Network (CRN) plays significant role in mobile
technology for energy efficient wireless 5G communication. The Non Orthogonal Frequency …