Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities

M Noor-A-Rahim, Z Liu, H Lee, MO Khyam… - Proceedings of the …, 2022 - ieeexplore.ieee.org
We are on the cusp of a new era of connected autonomous vehicles with unprecedented
user experiences, tremendously improved road safety and air quality, highly diverse …

[HTML][HTML] Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

RIS-assisted visible light communication systems: A tutorial

S Aboagye, AR Ndjiongue… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Recent intensive and extensive development of the fifth-generation (5G) of cellular networks
has led to their deployment throughout much of the world. As part of this implementation …

A systematic review on NOMA variants for 5G and beyond

I Budhiraja, N Kumar, S Tyagi, S Tanwar, Z Han… - IEEE …, 2021 - ieeexplore.ieee.org
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Coding techniques for backscatter communications-A contemporary survey

F Rezaei, D Galappaththige… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Backscatter communication (BackCom) networks enable passive/battery-free Internet-of-
Thing devices, providing reliable, massive connectivity while ensuring self-sustainability, low …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …