2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346836
|View full text |Cite
|
Sign up to set email alerts
|

PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…On the physical layer degree, location safety can be spilled by way of using passage manner choice calculations in 5G bendy networks [24]. International mobile subscriber identity (IMSI) getting attacks can be applied to uncover the character of a supporter via getting the IMSI of the endorser's user equipment (UE).…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…On the physical layer degree, location safety can be spilled by way of using passage manner choice calculations in 5G bendy networks [24]. International mobile subscriber identity (IMSI) getting attacks can be applied to uncover the character of a supporter via getting the IMSI of the endorser's user equipment (UE).…”
Section: Privacy Challenges In 5gmentioning
confidence: 99%
“…5G networks will be denser and of higher capacity than current 4G technology, using Massive MIMO technology [41]. Due to the high density of small cells, the knowledge of the cell, which is associated with a data subject, can easily reveal the location information of that subject [42]. Densification would bring out location privacy issues, affecting therefore further GDPR obligations and rights.…”
Section: B High Traffic Densitymentioning
confidence: 99%
“…The information asymmetry can be either leveraged or created by the attacker or the defender for achieving a successful cyber deception. For example, techniques such as honeynets [56,22], moving target defense [6,14,3], obfuscation [57,58,59,60], and mix networks [61] have been introduced to create difficulties for attackers to map out the system information.…”
Section: Literaturementioning
confidence: 99%