Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - Journal of Network and Computer …, 2022 - Elsevier
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …

Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

Multiagent deep-reinforcement-learning-based virtual resource allocation through network function virtualization in Internet of Things

HA Shah, L Zhao - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Resource allocation is a significant task in the emerging area of Internet of Things (IoT). IoT
devices are usually low-cost devices with limited computational power and capabilities for …

URJA: Usage jammer as a resource allocation for secure transmission in a CR-NOMA-based 5G femtocell system

I Budhiraja, N Kumar, S Tyagi, S Tanwar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In this article, a joint user pairing and secure resource allocation scheme for cognitive radio
inspired nonorthogonal multiple access (CR-NOMA) femtocells in the presence of a jammer …

Review of Physical Layer Security in 5G Wireless Networks

J Boodai, A Alqahtani, M Frikha - Applied Sciences, 2023 - mdpi.com
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate
and connect to the internet. However, as with any new technology, 5G networks also bring …

A physical layer security scheme for 6G wireless networks using post-quantum cryptography

W Abdallah - Computer Communications, 2024 - Elsevier
The sixth generation (6G) of mobile networks is poised to revolutionize communication
capabilities with its infinite-like reach. These networks will feature an ultra-dense topology …

SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks

R Dubey, PK Mishra, S Pandey - Journal of Network and Systems …, 2023 - Springer
The radio-cast nature of wireless communications is always exposed to the eavesdropping
attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) …

[Retracted] Energy‐Efficient Markov‐Based Lifetime Enhancement Approach for Underwater Acoustic Sensor Network

V Sivakumar, GR Kanagachidambaresan… - Journal of …, 2022 - Wiley Online Library
The multihop underwater acoustic sensor network (M‐UASN) collects oceanographic data at
different depths. Due to the harsh underwater environment, the route is a major research …

Physical layer security for 5G wireless networks: A comprehensive survey

JDV Sánchez, L Urquiza-Aguiar… - 2019 3rd cyber …, 2019 - ieeexplore.ieee.org
Physical-layer security is emerging approach that can benefit conventional encryption
methods. The main idea of physical layer security is to take advantage of the features of the …

Throughput maximization for underlay CR multicarrier NOMA network with cooperative communication

T Manimekalai, S Romera Joan, T Laxmikandan - ETRI Journal, 2020 - Wiley Online Library
The non‐orthogonal multiple access (NOMA) technique offers throughput improvement to
meet the demands of the future generation of wireless communication networks. The …