咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Physical layer security for ma... 收藏

Physical layer security for massive access in cellular Internet of Things

Physical layer security for massive access in cellular Internet of Things

作     者:Qiao QI Xiaoming CHEN Caijun ZHONG Zhaoyang ZHANG Qiao QI;Xiaoming CHEN;Caijun ZHONG;Zhaoyang ZHANG

作者机构:College of Information Science and Electronic Engineering Zhejiang University 

出 版 物:《Science China(Information Sciences)》 (中国科学:信息科学(英文版))

年 卷 期:2020年第63卷第2期

页      面:104-115页

核心收录:

学科分类:080904[工学-电磁场与微波技术] 13[艺术学] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 1305[艺术学-设计学(可授艺术学、工学学位)] 0810[工学-信息与通信工程] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统] 081101[工学-控制理论与控制工程] 0811[工学-控制科学与工程] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:supported by National Natural Science Foundation of China (Grant Nos. 61871344, 61922071, U1709219, 61725104) National Science and Technology Major Project of China (Grant No. 2018ZX03001017002) National Key R&D Program of China (Grant No. 2018YFB1801104) 

主  题:5G and beyond PHY-security massive access cellular IoT 

摘      要:The upcoming fifth generation(5G) cellular network is required to provide seamless access for a massive number of Internet of Things(IoT) devices over the limited radio spectrum. In the context of massive spectrum sharing among heterogeneous Io T devices, wireless security becomes a critical issue owing to the broadcast nature of wireless channels. According to the characteristics of the cellular IoT network,physical layer security(PHY-security) is a feasible and effective way of realizing secure massive access. This article reviews the security issues in the cellular IoT network with an emphasis on revealing the corresponding challenges and opportunities for the design of secure massive access. Furthermore, we provide a survey on PHY-security techniques to improve the secrecy performance. Especially, we propose a secure massive access framework for the cellular Io T network by exploiting the inherent co-channel interferences. Finally, we discuss several potential research directions to further enhance the security of massive IoT.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分