2018
DOI: 10.1109/access.2018.2832839
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(31 citation statements)
references
References 24 publications
0
28
0
Order By: Relevance
“…The encryption in a layered communication model such as TCP/IP can be performed at different levels of the communication, such as in layers 2 or 3 with MACsec or IPsec standards, respectively. Although encryption in physical layer (layer 1) is less usual than in other layers some proposals have been made, for example related with photonic [26]- [29] or radio [30], [31] technologies or with the physical layer protocols [20], [21], [32].…”
Section: Application Case: Ethernet 1000base-xmentioning
confidence: 99%
“…The encryption in a layered communication model such as TCP/IP can be performed at different levels of the communication, such as in layers 2 or 3 with MACsec or IPsec standards, respectively. Although encryption in physical layer (layer 1) is less usual than in other layers some proposals have been made, for example related with photonic [26]- [29] or radio [30], [31] technologies or with the physical layer protocols [20], [21], [32].…”
Section: Application Case: Ethernet 1000base-xmentioning
confidence: 99%
“…Also, considering that the AN transmitted by receiver and the signal transmitted by transmitter are through independent channels, the ZF operations of AN won't affect the precoding matrix V and decoding matrix U. Thus, after IA is performed, the transmission rate of receiver k can be expressed as (21) When the CSI between receiver and eavesdropper is unknown at the eavesdropper, the most appropriate way of the receiver is to send Gaussian white noise with the same band of transmitting signal. Thus, the received signals at the eavesdropper can be rewritten as…”
Section: Lemmamentioning
confidence: 99%
“…Security solutions for 5G networks at physical layer are probably the most reported technologies. Although, as previously said, most works are analyzing the security threats, challenges and opportunities [ 44 , 45 , 46 ]; some specific technologies have been reported. In particular, technologies based on different channel estimators to prevent spoofing attacks in the wireless media have been described [ 47 ].…”
Section: State Of the Art On 5g Security Solutions And C-ran Solutmentioning
confidence: 99%