Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities

H Zhou, W Xu, J Chen, W Wang - Proceedings of the IEEE, 2020 - ieeexplore.ieee.org
To enable large-scale and ubiquitous automotive network access, traditional vehicle-to-
everything (V2X) technologies are evolving to the Internet of Vehicles (IoV) for increasing …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges

F Naeem, M Ali, G Kaddoum, C Huang… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
While sixth-generation (6G) wireless systems are expected to bring about an explosion of
accessible user information and novel technologies, along with new threats to terrestrial and …

Physical-layer security in 6G networks

L Mucchi, S Jayousi, S Caputo… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
The sixth generation (6G) of mobile network will be composed by different nodes, from
macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full …

Physical layer security in cybertwin-enabled integrated satellite-terrestrial vehicle networks

Z Yin, N Cheng, TH Luan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we investigate the secure vehicle communications in cybertwin-enabled
integrated satellite-terrestrial networks, where the digital twins (DTs) in the cybertwin space …

Intelligent reflecting surface aided pilot contamination attack and its countermeasure

KW Huang, HM Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Pilot contamination attack (PCA) in a time division duplex wireless communication system is
considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in …

Multi-sensor Fusion and Cooperative Perception for Autonomous Driving: A Review

C Xiang, C Feng, X Xie, B Shi, H Lu… - IEEE Intelligent …, 2023 - ieeexplore.ieee.org
Autonomous driving (AD), including single-vehicle intelligent AD and vehicle–infrastructure
cooperative AD, has become a current research hot spot in academia and industry, and …

Secure RIS-aided MISO-NOMA system design in the presence of active eavesdropping

L Chai, L Bai, T Bai, J Shi… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
As for the time-division communications system, the pilot spoofing attack (PSA) technique is
maliciously utilized by active eavesdroppers during the uplink training phase, for …

On pilot spoofing attack in massive MIMO systems: Detection and countermeasure

W Xu, C Yuan, S Xu, HQ Ngo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Massive MIMO systems are vulnerable to pilot spoofing attacks (PSAs) since the estimated
channel state information can be contaminated by the eavesdropping link, thus incurring …

Fighting against active eavesdropper: Distributed pilot spoofing attack detection and secure coordinated transmission in multi-cell massive MIMO systems

X Wang, Z Zheng, Z Fei, Z Han… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The massive multi-input multi-output (mMIMO) systems are vulnerable to both pilot
contamination and pilot spoofing attack (PSA), which jeopardize the uplink channel …