Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Joint active and passive beamforming design for the IRS-assisted MIMOME-OFDM secure communications

W Jiang, B Chen, J Zhao, Z Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The effective combination of physical layer security communication and intelligent reflecting
surface (IRS) technology has recently attracted extensive attention to improve the system …

Multi-objective optimization approaches for physical layer secure communications based on collaborative beamforming in UAV networks

J Li, G Sun, H Kang, A Wang, S Liang… - IEEE/ACM …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications and networks are promising technologies
in the forthcoming 5G/6G wireless communications. However, they have challenges for …

On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

H Bastami, M Letafati, M Moradikia… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent
logistics, search and rescue as well as in air-borne Base Station (BS). However, their …

Secured wireless network based on a novel dual integrated neural network architecture

HV Ramachandra, P Chavan… - Journal of Electrical …, 2023 - Wiley Online Library
The development of the fifth generation (5G) and sixth generation (6G) wireless networks
has gained wide spread importance in all aspects of life through the network due to their …

On message authentication channel capacity over a wiretap channel

D Chen, S Jiang, N Zhang, L Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a novel message authentication model using the same key over wiretap
channel is proposed to achieve information-theoretic security. Specifically, in the proposed …

[HTML][HTML] Further analysis of the statistical independence of the NIST SP 800-22 randomness tests

EA Luengo, BA Olivares, LJG Villalba… - Applied Mathematics …, 2023 - Elsevier
In multiple applications, from Statistics to Particle Physics and notably in Cryptography and
Computer Security, it is necessary to obtain long sequences of random numbers. In order to …

A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV

M Alkanhal, A Alali, M Younis - IoT, 2023 - mdpi.com
In recent times, the advent of innovative technological paradigms like the Internet of Things
has paved the way for numerous applications that enhance the quality of human life. A …

Secure transmission in NOMA-enabled Industrial IoT with resource-constrained untrusted devices

S Thapar, D Mishra, R Saini - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
The security of confidential information associated with devices in the industrial Internet of
Things (IIoT) network is a serious concern. This article focuses on achieving a non …

Green MEC networks design under UAV attack: A deep reinforcement learning approach

R Zhao, J Xia, Z Zhao, S Lai, L Fan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we propose a novel optimization framework for a secure and green mobile
edge computing (MEC) network, through a deep reinforcement learning approach, where …