...
首页> 外文期刊>Physical Communication >Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review
【24h】

Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review

机译:Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review

获取原文
获取原文并翻译 | 示例
           

摘要

It has been predicted that by the year 2030, 5G and beyond 5G (B5G) networks are expected to provide hundreds of trillions of gigabytes of data for various emerging applications such as augmented, mixed, and virtual reality (AR/MR/VR), wireless computer-brain interfaces (WCBI), connected robotics and autonomous systems. Most of these applications share data with each other using an open channel, i.e., the Internet. The open and broadcast nature of wireless channel makes the communication susceptible to various types of attacks (e.g., eavesdropping, jamming). Thus, there is a strong requirement to enhance the secrecy of wireless channel to maintain the privacy and confidentiality of transmitted data. Physical layer security (PLS) has evolved as a novel concept and robust alternative to cryptographybased techniques, which have a number of drawbacks and practical issues for 5G and beyond networks. Beamforming is an energy-efficient PLS technique, that involves steering of the transmitted signal in a particular direction, while considering that an intruding user attempts to decode the transmitted data. Motivated from these points, this article summarizes various beamforming based PLS techniques for secure data transmission in 5G and B5G networks. We investigate the eight most promising techniques for beamforming in PLS: Non-Orthogonal Multiple Access (NOMA), Full-Duplex Networks, Massive Multiple-Input Multiple-Output (MIMO), Cognitive Radio (CR) Network, Relay Network, Simultaneous Wireless Information and Power Transfer (SWIPT), UAV Communication Networks and Space Information Networks, and Heterogeneous Networks. Moreover, various physical layer threats and countermeasures associated with 5G and B5G networks are subsequently covered. Lastly, we provide insights to the readers about constraints and challenges for the usage of beamforming-based PLS techniques in various upcoming future applications. (c) 2022 Elsevier B.V. All rights reserved.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号