A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions

A Kalla, C De Alwis, P Porambage, G Gür… - Journal of Industrial …, 2022 - Elsevier
While 5G is at the early deployment state around the globe, the research and industrial
communities have already started concentrating their efforts on formulating the overall 6G …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

A unified architectural approach for cyberattack-resilient industrial control systems

C Zhou, B Hu, Y Shi, YC Tian, X Li… - Proceedings of the …, 2020 - ieeexplore.ieee.org
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

NFV security survey in 5G networks: A three-dimensional threat taxonomy

T Madi, HA Alameddine, M Pourzandi, A Boukhtouta - Computer Networks, 2021 - Elsevier
Fifth Generation (5G) networks aim at providing value-added services with advanced
performance such as low-latency communications, high reliability, high data rates and …

Network layer attacks and countermeasures in cognitive radio networks: A survey

M Bouabdellah, N Kaabouch, F El Bouanani… - Journal of information …, 2018 - Elsevier
Spectrum scarcity is the principal motivation behind the development of cognitive radio. This
technology introduces new functionalities at the physical, medium access control, and …

Generalized byzantine attack and defense in cooperative spectrum sensing for cognitive radio networks

J Wu, T Song, Y Yu, C Wang, J Hu - IEEE Access, 2018 - ieeexplore.ieee.org
Cognitive radio (CR) is a revolutionary paradigm to solve the spectrum scarcity problem in
wireless networks. In cognitive radio networks, cooperative spectrum sensing is regarded as …

Secure cooperative spectrum sensing under primary user emulation attack in cognitive radio networks: Attack-aware threshold selection approach

AA Sharifi, M Sharifi, MJM Niya - AEU-International Journal of Electronics …, 2016 - Elsevier
Cooperative spectrum sensing (CSS) is an effective approach to improve the detection
performance in cognitive radio (CR) networks. The CSS process imposes some additional …

Security threats and countermeasures of MAC layer in cognitive radio networks

MR Manesh, N Kaabouch - Ad Hoc Networks, 2018 - Elsevier
Cognitive radio is a promising technology proposed to solve the scarcity of the radio
spectrum by opportunistically allocating the idle channels of the licensed users to …