Proceedings of the 9th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2016
DOI: 10.1145/2939918.2939923
|View full text |Cite
|
Sign up to set email alerts
|

Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…While papers (e.g., [39] [40]) do focus on the security aspects, security issues are now generally reviewed in dedicated surveys (e.g., [30] [31]). As for performance analysis publications, we decided not to include them because they do not put forward any new solutions.…”
Section: Paper's Scope Organization and Reading Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…While papers (e.g., [39] [40]) do focus on the security aspects, security issues are now generally reviewed in dedicated surveys (e.g., [30] [31]). As for performance analysis publications, we decided not to include them because they do not put forward any new solutions.…”
Section: Paper's Scope Organization and Reading Mapmentioning
confidence: 99%
“…While papers (e.g., [39] [40]) do focus on the security aspects, security issues are now generally reviewed in dedicated surveys (e.g., [30] [31]). As for performance analysis This paper has been accepted for publication in IEEE Communications Surveys & Tutorials.…”
Section: ) Work Excluded From the Scope Of This Surveymentioning
confidence: 99%
“…Three articles [202][203][204] provide a solution that relieves the IoT provider's burden of device identity management while also lowering operational costs. Open-source software for LTE, identity management, and IoT is used to implement the solution.…”
Section: Securitymentioning
confidence: 99%
“…In their current work, Zenger et al [60] propose a scheme that utilizes adaptive wormholes to enable PHY-SEC protocol execution over potentially untrusted relays.…”
Section: Wireless Channel Only-solutionsmentioning
confidence: 99%