Review of Physical Layer Security in 5G Wireless Networks
Abstract
:1. Introduction
2. Methodology
3. Literature Review
4. Conclusions
5. Future Research
5.1. Security and Fading Channel Models in 5G Networks
5.2. Security Solutions for 5G Networks
5.3. Evaluating the Effectiveness of Physical Layer Security Solutions in 5G Networks
5.4. New Transmission Methods
5.5. Exploiting Interference
5.6. Quantum-Safe Security
5.7. Standardization and Practical Implementations
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Li, J.; Yang, H.; Chen, W.; Sun, Y.; Wang, S. A survey on physical layer security for 5G wireless networks. Wirel. Pers. Commun. 2019, 105, 113–138. [Google Scholar] [CrossRef]
- Zhou, L.; Wu, D.; Zheng, B.; Guizani, M. Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 2014, 52, 66–72. [Google Scholar] [CrossRef]
- Wang, H.-M.; Zheng, T.-X.; Yuan, J.; Towsley, D.; Lee, M.H. Physical layer security in heterogeneous cellular networks. IEEE Trans. Commun. 2016, 64, 1204–1219. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.; Zhang, L.; Ye, Q.; Li, Y.; Liu, G. Physical layer security for 5G wireless networks: Recent advances and future challenges. J. Netw. Comput. Appl. 2018, 116, 53–67. [Google Scholar] [CrossRef]
- Zheng, T.-X.; Wang, H.-M.; Yuan, J.; Han, Z.; Lee, M.H. Physical layer security in wireless Ad Hoc networks under a hybrid full-/half-duplex receiver deployment strategy. IEEE Trans. Wirel. Commun. 2017, 16, 3827–3839. [Google Scholar] [CrossRef]
- Islam, S.M.R.; Zhang, J.; Lu, R.; Hussain, S.A. 5G security: Analysis of threats and solutions. IEEE Wirel. Commun. 2019, 26, 120–128. [Google Scholar] [CrossRef]
- Cepheli, O.; Tedik, S.; Kurt, G.K. A high data rate wireless communication system with improved secrecy: Full duplex beamforming. IEEE Commun. Lett. 2014, 18, 1075–1078. [Google Scholar] [CrossRef]
- Gao, Y.; Hu, S.; Tang, W.; Li, Y.; Sun, Y.; Huang, D.; Cheng, S.; Li, X. Physical layer security in 5G based large-scale social networks: Opportunities and challenges. IEEE Access 2018, 6, 26350–26357. [Google Scholar] [CrossRef]
- Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
- Lopez-Martinez, F.J.; Romero-Jerez, J.M.; Paris, J.F. On the calculation of the incomplete mgf with applications to wireless communications. IEEE Trans. Commun. 2017, 65, 458–469. [Google Scholar] [CrossRef]
- Stallings, W. Cryptography and Network Security: Principles and Practice; Prentice Hall: New York, NY, USA, 2008. [Google Scholar]
- He, B.; Zhou, X.; Swindlehurst, A.L. On secrecy metrics for physical layer security over quasi-static fading channels. IEEE Trans. Wirel. Commun. 2016, 15, 6913–6924. [Google Scholar] [CrossRef] [Green Version]
- Ud Din, F.; Labeau, F. Multiple antenna physical layer security against passive eavesdroppers: A tutorial. In Proceedings of the 2018 IEEE Canadian Conference on Electrical Computer Engineering (CCECE), Quebec, QC, Canada, 13–16 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Shah, H.A.; Koo, I. A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access 2018, 6, 29486–29498. [Google Scholar] [CrossRef]
- Wang, X.; Xu, K.; Huang, X.; Ji, X.; Chen, Y.; Jin, L. Artificial noise aided hybrid analog-digital beamforming for secure transmission in MIMO millimeter-wave relay systems. IEEE Access 2019, 7, 28597–28606. [Google Scholar] [CrossRef]
- Yan, S.; Zhou, X.; Yang, N.; Abhayapala, T.D.; Swindlehurst, A.L. Secret channel training to enhance physical layer security with a full-duplex receiver. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2788–2800. [Google Scholar] [CrossRef] [Green Version]
- Liu, D.; Hong, W.; Rappaport, T.S.; Luxey, C.; Hong, W. What will 5G antennas and propagation be? IEEE Trans. Antennas Propag. 2017, 65, 6205–6212. [Google Scholar] [CrossRef]
- Mathur, A.; Ai, Y.; Bhatnagar, M.R.; Cheffena, M.; Ohtsuki, T. On physical layer security of α-η-κ-μ fading channels. IEEE Commun. Lett. 2018, 22, 2168–2171. [Google Scholar] [CrossRef] [Green Version]
- Zeng, W.; Zhang, J.; Chen, S.; Peppas, K.P.; Ai, B. Physical layer security over fluctuating two-ray fading channels. IEEE Trans. Veh. Technol. 2018, 67, 8949–8953. [Google Scholar] [CrossRef] [Green Version]
- Boche, H.; Deppe, C. Secure identification under passive eavesdroppers and active jamming attacks. IEEE Trans. Inf. Forensics Secur. 2019, 14, 472–485. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
- Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
- Akram, R.N.; Khan, M.A.; Raza, S.; Awais, M. Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms. Internet Things 2021, 2, 5. [Google Scholar] [CrossRef]
- Raza, S.; Ullah, S.; Khan, M.A. The impact of quantum computing on real-world security: A 5G case study. Comput. Netw. 2020, 171, 107167. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Manickam, S.; Saare, M.A. Enhancement of NTSA secure communication with one-time pad (OTP) in IoT. Informatica 2023, 43, 569–580. [Google Scholar] [CrossRef]
- Maqbool, A.; Abbas, H.; Mustafa, M.; Zahoor, A. A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard. J. Cryptogr. Eng. 2023, 11, 103–128. [Google Scholar] [CrossRef]
- Maqbool, A.; Abbas, H. FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software. J. Cryptogr. Eng. 2023, 10, 363–380. [Google Scholar] [CrossRef]
- Shah, H.A.; Koo, I. Overview of 5G architecture security. IEEE Access 2021, 6, 39152–39168. [Google Scholar] [CrossRef]
- Seo, H.; Azarderakhsh, R. Curve448 on 32-Bit ARM Cortex-M4. In Proceedings of the 15th International Conference on Embedded Security in Silicon, Seoul, Republic of Korea, 2–4 December 2020; Springer Nature: Cham, Switzerland, 2021; pp. 107–125. [Google Scholar] [CrossRef]
- Anastasova, M.; Bisheh-Niasar, M.; Azarderakhsh, R.; Kermani, M.M. Compressed SIKE Round 3 on ARM Cortex-M4. In Security and Privacy in Communication Networks, Proceedings of the 17th EAI International Conference, SecureComm 2021, Virtual Event, 6–9 September 2021; Springer International Publishing: Cham, Switzerland, 2021; Part II; pp. 441–457. [Google Scholar]
- Anastasova, M.; Azarderakhsh, R.; Kermani, M.M. Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 4129–4141. [Google Scholar] [CrossRef]
- Sanal, P.; Karagoz, E.; Seo, H.; Azarderakhsh, R.; Mozaffari-Kermani, M. Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. In Security and Privacy in Communication Networks, Proceedings of the 17th EAI International Conference, SecureComm 2021, Virtual Event, 6–9 September 2021; Springer International Publishing: Cham, Switzerland, 2021; Part II; pp. 424–440. [Google Scholar]
- Bisheh-Niasar, M.; Azarderakhsh, R.; Mozaffari-Kermani, M. Cryptographic accelerators for digital signature based on Ed25519. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2021, 29, 1297–1305. [Google Scholar] [CrossRef]
- Canto, A.C.; Mozaffari-Kermani, M.; Azarderakhsh, R. Reliable CRC-based error detection constructions for finite field multipliers with applications in cryptography. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2020, 29, 232–236. [Google Scholar] [CrossRef]
- Abed, S.E.; Jaffal, R.; Mohd, B.J.; Al-Shayeji, M. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Clust. Comput. 2021, 24, 3065–3084. [Google Scholar] [CrossRef]
- Lin, J.; He, J.; Fan, Y.; Wang, M. From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. Cryptol. ePrint Arch. 2023, 136, 101–118. [Google Scholar]
- Li, M.; Zhao, D.; Tang, X.; Cheng, S.; Hu, X.; Bao, L. Hardware Implementation and optimization Design of Lightweight RECTANGLE Algorithm. In Proceedings of the 2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 11–13 December 2020; IEEE: Piscataway, NJ, USA, 2020; Volume 9, pp. 1447–1450. [Google Scholar]
- Zheng, F.; Li, Y.; Li, X.; Wang, Q.; Mao, G. 5G wireless networks: From architecture to physical layer security. IEEE Wirel. Commun. 2018, 25, 102–108. [Google Scholar] [CrossRef]
- Lyu, Q.; Han, G.; Fu, X. Physical layer security in multi-hop AF relay network based on compressed sensing. IEEE Commun. Lett. 2018, 22, 1882–1885. [Google Scholar] [CrossRef]
- Vuppala, S.; Tolossa, Y.J.; Kaddoum, G.; Abreu, G. On the physical layer security analysis of hybrid millimeter-wave networks. IEEE Trans. Commun. 2018, 66, 1139–1152. [Google Scholar] [CrossRef]
- Schaefer, R.F.; Amarasuriya, G.; Poor, H.V. Physical layer security in massive MIMO systems. In Proceedings of the 2017 51st Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 29 October–1 November 2017; pp. 3–8. [Google Scholar] [CrossRef]
- Wang, C.; Wang, H.-M. Physical layer security in millimeter wave cellular networks. IEEE Trans. Wirel. Commun. 2016, 15, 5569–5585. [Google Scholar] [CrossRef] [Green Version]
- Eltayeb, M.E.; Choi, J.; Al-Naffouri, T.Y.; Heath, R.W., Jr. On the security of millimeter wave vehicular communication systems using random antenna subsets. arXiv 2016, arXiv:1609.04499. [Google Scholar]
- Chen, G.; Gong, Y.; Xiao, P.; Chambers, J.A. Physical layer network security in the full-duplex relay system. IEEE Trans. Inf. Forensics Secur. 2015, 10, 574–583. [Google Scholar] [CrossRef] [Green Version]
- Zhu, F.; Gao, F.; Zhang, T.; Sun, K.; Yao, M. Physical-layer security for full duplex communications with self-interference mitigation. IEEE Trans. Wirel. Commun. 2016, 15, 329–340. [Google Scholar] [CrossRef]
Inclusion Criteria | Exclusion Criteria |
---|---|
Studies that focus on physical layer security in 5G wireless networks. | Studies that do not focus on the physical layer security in 5G wireless networks. |
Studies that investigate security issues, vulnerabilities, and threats in the physical layer of 5G wireless networks. | Studies that focus on other layers of the 5G network or on other wireless networks. |
Studies that propose or evaluate physical layer security solutions or mechanisms for 5G wireless networks. | Studies that are not related to security, vulnerabilities, or threats in the physical layer of 5G wireless networks. |
Studies that are published in peer-reviewed journals or conference proceedings. | Studies that do not propose or evaluate physical layer security solutions or mechanisms for 5G wireless networks. |
Author | Publication Year | Type | Suggested Technique | Advantages | Limitations |
---|---|---|---|---|---|
Y. Gao, S. Hu, et al. [8] | 2018 | Physical Layer Security Testing | To determine the coverage area and find any signal leakage or interference from unauthorized devices, a wireless signal strength analysis can be conducted. Any unauthorized equipment using the same frequency band can be found via spectrum analysis. Testing for jamming can be conducted to see how well the system resists different kinds of jamming attacks. Testing for interception involves attempting to intercept wireless signals in order to assess the confidentiality of the sent data. | It can be utilized to verify the system’s security requirements and guarantee adherence to security standards. | It is unable to solve more complex security problems such as authentication and authorization, which call for separate testing approaches. |
N. Yang, L et al. [9] | 2015 | Physical Layer Security Testing | Channel estimate can be used to assess the wireless channel’s quality and find any irregularities that can point to a security risk. | Physical layer security testing offers a thorough assessment of the system’s wireless security. | Additional testing could be necessary to guarantee full security coverage because it might not find all kinds of security flaws. |
F. J. LopezMartinez et al. [10] | 2017 | Security Testing | Valuable insights into the mathematical foundations of wireless communications, which can inform the design and development of wireless communication systems. | Fading channels, which are frequently found in wireless networks, are accurately modeled by the incomplete MGF. | It can be challenging to apply the incomplete MGF in practice due to its complexity and the requirement for specialized mathematical tools to calculate it. |
W. Stallings. et al. [11] | 2008 | Network | It provides foundational knowledge that can inform the design and testing of secure network systems. | The book provides practical examples and case studies to help readers understand the material. | The book does not provide specific recommendations for Pen Test Types or testing techniques. |
B. He, et al. [12] | 2016 | Network security | Valuable resource for researchers and practitioners working in the field of physical layer security over quasistatic fading channels | It provides insights into the effects of quasistatic fading channels on physical layer security. | The article focuses specifically on quasistatic fading channels and may not be directly applicable to other types of channels. |
F. Ud Din et al. [13] | 2018 | Physical layer testing | It provides insights into the principles and techniques of physical layer security that can inform the design and testing of secure wireless communication systems. | The article provides practical examples and case studies to help readers understand the material. | The article does not provide specific recommendations for Pen Test Types or testing techniques |
H. A. Shah et al. [14] | 2018 | Physical | Provides insights into the principles and techniques of physical layer security in cognitive radio networks that can inform the design and testing of secure wireless communication systems. | The proposed scheme is based on OFDM technology, which is widely used in modern wireless communication systems. | The article may be too technical for readers without a strong background in wireless communications or signal processing. |
S. Wang et al. [15] | 2019 | Wireless Security Penetration Testing | A wireless security penetration testing approach, involving spectrum analysis and radio signal analysis, can be used to evaluate the effectiveness of the proposed approach and identify potential vulnerabilities in the system. | The proposed approach utilizes artificial noise-aided hybrid analog–digital beamforming for secure transmission. | The effectiveness of the proposed approach may be impacted by environmental factors, such as interference and multi-path propagation. |
S. Yan, et al. [16] | 2018 | Wireless Security Penetration Testing | Man-in-the-Middle Attack Simulation | The article proposes a novel approach to enhancing physical layer security with a full-duplex receiver by using secret channel training. | The proposed model is extremely effective in detecting vulnerabilities and identifying web application threats/risks. |
D. Liu, et al. [17] | 2017 | Vulnerability Assessment | Wireless signal analysis and simulation tools to assess the antenna and propagation characteristics of 5G networks | Helps identify potential interference and signal attenuation issues that can affect network performance. | Requires detailed knowledge and understanding of antenna and propagation characteristics and wireless signal analysis tools. |
A. Mathur, et al. [18] | 2018 | Wireless communication system | An analytical approach to evaluate the physical layer security of wireless communication systems operating in fading channels. | The approach is based on mathematical modeling and analysis, which can provide insights into the fundamental aspects of the system design. | The proposed approach is based on certain assumptions and simplifications, which may not represent the real-world wireless communication scenarios. |
W. Zeng, et al. [19] | 2018 | Physical security | Fluctuating Two-Ray Fading Channel Model | The fluctuating two-ray fading channel model can provide a more accurate representation of the physical layer security of wireless communication systems. | The accuracy of the results obtained from the fluctuating two-ray fading channel model is dependent on the accuracy of the model parameters and assumptions made. |
H. Boche, C. Deppe [20] | 2019 | Security | The scheme uses a hybrid approach that combines the advantages of both approaches to improve security against passive eavesdroppers and active jamming attacks. | The proposed scheme provides a high level of security against both passive and active attacks, making it suitable for applications that require strong authentication and protection against eavesdropping and jamming. | The proposed scheme may have high computational and processing requirements due to the use of multiple authentication mechanisms. |
Y. Zou, et al. [21] | 2016 | Wireless security | Conduct a literature review of recent research in wireless security to identify technical challenges, recent advances, and future trends. | This can be useful for understanding the landscape of wireless security, identifying potential vulnerabilities and threats, and informing the development of new security solutions. | A survey paper may not provide detailed technical information on specific security solutions, and it may not cover all recent research in the field. |
N. A. Mukherjee et al. [22] | 2014 | Physical Layer Security Testing | The analysis and conclusions of the paper are limited by the quality of the studies that were reviewed. | Provides a comprehensive overview of the principles of physical layer security in multiuser wireless networks. | The paper may not include the latest research developments and techniques, as it was published in 2014. |
Akram, R. N., Khan. [23] | 2021 | IoT Security | The usage of lattice-based algorithms, a type of cryptographic algorithm built on the conceptual framework of lattices, was used. It examines several lattice-based cryptographic primitives and how to use them to protect IoT connections and devices. | IoT scenarios can use lattice-based cryptography in a variety of ways. Numerous cryptographic attacks, such as those based on number factorization and discrete logarithm problems, have proven resilient against lattice-based techniques. | Due to the requirement for standardization, interoperability, and integration with existing systems, lattice-based algorithms may encounter difficulties in real-world IoT deployments. |
Raza, S., Ullah, S. [24] | 2020 | Network Security | Quantum computing on cryptographic algorithms used in 5G network security. | Emphasizing the possible effects of quantum computing on practical security. Highlights the application of quantum computing to a particular system in the real world. | As the field develops, it could need to be re-evaluated. |
Ullah, S., Riaz, M. [25] | 2023 | Security | Enhances the security of communication in the Internet of things by combining the NTSA secure communication protocol with a one-time pad (OTP). | The suggested method adds an extra layer of security to IoT connection. Focuses on solving the unique difficulties and vulnerabilities that IoT networks deliver in order to improve privacy and security. | One-time pads (OTPs) can add to computational cost, especially in IoT devices with limited resources. The study does not go into great detail on the possible effects on system performance or energy usage. |
Maqbool, A., Abbas, H. [26] | 2023 | Security | Focuses on the NIST Lightweight Cryptography Standard. | Covering a range of topics, including implementations, attacks, and defenses. | The study might not have conducted a thorough analysis of how well lightweight cryptography works in particular real-world situations. It’s possible that the conversation will be less practical and more theoretical. |
Maqbool, A., Abbas, H. [27] | 2023 | Security Assessment | The FaultMeter technique, which is designed for quantitative assessment of fault attacks on block cipher software. | By inserting particular flaws into the block cipher algorithm’s execution, the technique permits precise analysis. This enables researchers to measure fault propagation and evaluate how susceptible the software is to various fault assaults. | The particular way the block cipher software is implemented may have an impact on how well FaultMeter works. When exposed to fault attacks, various implementations could behave differently, which could have an impact on the technique’s reliability and generalizability. |
Shah, H. A. [28] | 2021 | 5G Security | Security architecture of 5G networks. | Explains the various standards, protocols, and security techniques employed in the 5G architecture. It offers information on key management, access control, authentication, encryption, and other security-related topics. | The theoretical elements of the 5G security architecture are the main emphasis of the article. There are no in-depth case studies or instances from the real world of security issues or breaches in 5G networks. |
Seo, H., R. [29] | 2021 | Security | New microarchitecture design for Curve448 and Ed448 elliptic curves on ARM Cortex-M4 processor. | Compared to the prior state-of-the-art implementation, achieves a substantial speedup. Compared to the prior state-of-the-art implementation, has a reduced overhead area. | More complicated than the most recent innovative implementation. Not always appropriate for all uses. |
Anastasova, M., M. [30] | 2021 | Security | New compression technique for the SIKE Round 3 scheme on the ARM Cortex-M4 processor. | Reduces by up to 50 percent the size of the points on the elliptic curves. Can result in a significant speedup of the SIKE Round 3 computation. | Not as precise as the initial illustration of the elliptic curve points. May result in a minor loss of security. |
Anastasova, M., M. [31] | 2021 | Security | Number of techniques for accelerating the implementation of the Supersingular Isogeny Key Encapsulation (SIKE) Round 3 scheme on ARM Cortex-M4 processors. | Can result in considerable speedups, perhaps up to 10 times. A number of applications where great performance is needed can leverage this. | Not always appropriate for all uses, maybe calling for more hardware or software resources. |
Sanal, P., Karagoz, E. [32] | 2021 | Security | Combination of software and hardware acceleration techniques for the Kyber post-quantum key exchange protocol on 64-bit ARM Cortex-A processors. | Can significantly speed up compared to the most recent state-of-the-art implementation. A number of applications where great performance is needed can leverage this. | Not always appropriate for all uses, maybe calling for more hardware or software resources. |
Bisheh-Niasar, M. [33] | 2021 | Security | Cryptographic accelerator for digital signatures based on the Ed25519 curve. | Can significantly outperform the most recent state-of-the-art implementation in terms of speed. Is suitable for a wide range of applications where excellent performance is needed. | Not always appropriate for all uses, maybe calling for more hardware or software resources. |
Canto, A. C. [34] | 2020 | Security | Uses cyclic redundancy check (CRC) codes to detect single-bit errors in a stream of data. | Effective at most likely spotting problems. Efficient, and the finite field multiplier is not much burdened. | Might not be able to catch every error. Not as effective as some other methods of error detection. |
Abed, S. E., Jaffal, R. [35] | 2021 | Security | Lightweight hash functions. Focuses on the Grostl hash function. | Secure and effective. Can be applied to a range of IoT gadgets. | Possibly less secure than certain other hashing operations. On some platforms, it might not be as effective as some other hash methods. |
Lin, J., He, J., Fan, Y. [36] | 2023 | Security | Method uses a statistical analysis of the cipher’s output to detect faults. | Efficient and does not significantly increase the cipher’s burden. Can be used to increase Midori’s security. | Possibly unable to find all flaws. Possibly less precise than some other methods of defect diagnosis. |
Li, M., Zhao, D., Tang, X. [37] | 2020 | Security | Proposes a new hardware implementation of the RECTANGLE cipher. The proposed implementation is based on a bitslice architecture. | Efficient and adaptable to a range of devices with limited resources. Additionally suggests a novel technique for RECTANGLE fault diagnosis. The approach is based on the finding that RECTANGLE flaws can lead to incorrect output from the cipher. The technique analyzes the output of the encryption statistically to find errors. | A RECTANGLE implementation that is not as secure as others might be. On some platforms, this RECTANGLE implementation might not be as effective as some other ones. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Boodai, J.; Alqahtani, A.; Frikha, M. Review of Physical Layer Security in 5G Wireless Networks. Appl. Sci. 2023, 13, 7277. https://doi.org/10.3390/app13127277
Boodai J, Alqahtani A, Frikha M. Review of Physical Layer Security in 5G Wireless Networks. Applied Sciences. 2023; 13(12):7277. https://doi.org/10.3390/app13127277
Chicago/Turabian StyleBoodai, Jawhara, Aminah Alqahtani, and Mounir Frikha. 2023. "Review of Physical Layer Security in 5G Wireless Networks" Applied Sciences 13, no. 12: 7277. https://doi.org/10.3390/app13127277
APA StyleBoodai, J., Alqahtani, A., & Frikha, M. (2023). Review of Physical Layer Security in 5G Wireless Networks. Applied Sciences, 13(12), 7277. https://doi.org/10.3390/app13127277