Physical-layer security in 6G networks

L Mucchi, S Jayousi, S Caputo… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
The sixth generation (6G) of mobile network will be composed by different nodes, from
macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full …

A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy

ND Tuyen, NS Quan, VB Linh, V Van Tuyen… - IEEE …, 2022 - ieeexplore.ieee.org
The blossom of renewable energy worldwide and its uncertain nature have driven the need
for a more intelligent power system with the deep integration of smart power electronics. The …

LoRa device fingerprinting in the wild: Disclosing RF data-driven fingerprint sensitivity to deployment variability

A Elmaghbub, B Hamdaoui - IEEE Access, 2021 - ieeexplore.ieee.org
Deep learning-based fingerprinting techniques have recently emerged as potential enablers
of various wireless applications. However, their resiliency to time, location, and/or …

Multi-agent reinforcement learning-based buffer-aided relay selection in IRS-assisted secure cooperative networks

C Huang, G Chen, KK Wong - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper proposes a multi-agent deep reinforcement learning-based buffer-aided relay
selection scheme for an intelligent reflecting surface (IRS)-assisted secure cooperative …

6G 与广域物联网

尤肖虎, 尹浩, 邬贺铨 - 物联网学报, 2020 - infocomm-journal.com
6G 技术尚处于研究的起步阶段, 预计在未来几年, 全球将就6G 的发展愿景与关键技术指标逐步
达成共识. 围绕应用范畴的再扩展与技术性能的再提升问题, 首先对未来6G 无线接入可能涉及的 …

Advances on security threats and countermeasures for cognitive radio networks: A survey

RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …

User-centric view of unmanned aerial vehicle transmission against smart attacks

L Xiao, C Xie, M Min, W Zhuang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish
and subjective end-users and use smart radio devices to change their attack types and …

Secure semantic communications: Fundamentals and challenges

Z Yang, M Chen, G Li, Y Yang, Z Zhang - IEEE Network, 2024 - ieeexplore.ieee.org
Semantic communication allows the receiver to know the intention instead of the bit
information itself, which is an emerging technique to support real-time human-machine and …

Secure space–time-modulated millimetre-wave wireless links that are resilient to distributed eavesdropper attacks

S Venkatesh, X Lu, B Tang, K Sengupta - Nature Electronics, 2021 - nature.com
As wireless networks move to millimetre-wave (mm-wave) and terahertz (THz) frequencies
for 5G communications and beyond, ensuring security and resilience to eavesdropper …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …