Abstract

This article aims to provide a comprehensive overview on PHY layer security assisted ICV networks. Beginning with a discussion from a general perspective of the ICV network architecture, this work summarizes the major security threats faced by ICV networks. To achieve confidential data transmission with a low latency and a high data rate, several physical layer security schemes are surveyed in this article, which include RRM, cooperative jamming, multi-antenna technologies, and PHY-layer key generation. In addition, the performances of the aforementioned schemes are compared in terms of different aspects, followed by a discussion on some major challenges that need to be tackled in the implementation of ICV networks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call