A Systematic Literature Review of Security in 5G based Social Networks

MT Alshurideh, BY Obeidat, V Victoria… - … on Cyber Resilience …, 2022 - ieeexplore.ieee.org
With increase in the use of social networks, we also need the increase in the security of
those networks. Making the connection secure is critical and the priority now a day so that …

Physical layer security in 5G based large scale social networks: Opportunities and challenges

Y Gao, S Hu, W Tang, Y Li, Y Sun, D Huang… - IEEE …, 2018 - ieeexplore.ieee.org
The increasing demand in 5G wireless systems has brought significant improvement in
transmission speed with lower latency, especially in ultra-dense networks. The demand of …

On Securing Cognitive Radio Networks-Enabled SWIPT Over Cascaded - Fading Channels With Multiple Eavesdroppers

DH Tashman, W Hamouda… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, the physical-layer security (PLS) for an underlay cognitive radio network (CRN)
with multiple non-colluding eavesdroppers is studied. We assume that a secondary user …

Uplink coverage and capacity analysis of mMTC in ultra-dense networks

M Kamel, W Hamouda… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the uplink coverage and ergodic capacity of massive Machine-
Type Communication (mMTC) considering an Ultra-Dense Network (UDN) environment. In …

Satisfaction-maximized secure computation offloading in multi-eavesdropper MEC networks

S Liu, Y Yu, L Guo, PL Yeoh, B Vucetic… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we consider a mobile edge computing (MEC)-based secure computation
offloading system, and design a practical multi-eavesdropper model including two specific …

Physical Layer Security Over -- and -- Fading Channels

JM Moualeu, DB da Costa, W Hamouda… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this correspondence, the physical layer security of wireless systems under generalized α-
κ-μ and α-η-μ fading with arbitrary fading parameters is analyzed in terms of the secrecy …

Secure computation offloading for device-collaborative mec networks: A drl-based approach

M Sun, X Xu, S Han, H Zheng, X Tao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates secure computation offloading in device-collaborative mobile edge
computing (MEC) networks, where mobile users (MUs) can process a part of their tasks …

Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels

DH Tashman, W Hamouda - IEEE Transactions on Cognitive …, 2021 - ieeexplore.ieee.org
This paper investigates the physical-layer security (PLS) of a single-input-multiple-output
(SIMO) underlay cognitive radio network (CRN) over cascaded-fading channels. A …

Secure transmissions in wireless information and power transfer millimeter-wave ultra-dense networks

X Sun, W Yang, Y Cai, L Tao, Y Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The millimeter-wave (mmWave) ultra-dense networks are more suitable for wireless power
transfer, since the short-distance transmissions experience less pathloss and the base …

A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning

D Marabissi, A Abrardo, L Mucchi - Mobile Networks and Applications, 2023 - Springer
Densification of networks through heterogeneous cells deployment is considered a key
technology to satisfy the huge traffic growth in future wireless systems. In addition to …