Abstract

5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm. However, as the definition and implementation of 5G networks are in progress, many security challenges arise. Thus, special emphasis will be given in the coming years to provide security and privacy for 5G and beyond networks. In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios. In light of this, herein we provide an overview on some promising physical-layer techniques, focusing on the requirements and design challenges for machine-type communication scenarios. Key issues are discussed along with potential solutions.

Highlights

  • The design of practical wiretap codes that achieve the secrecy capacity limit at the finite blocklength regime, and satisfy the constrains of MTC scenarios and heterogeneous environments (including highly dynamic or poor scattering environments where a strong correlation between legitimate and wiretap channels can occur [8]) remains a challenging task

  • 5G and beyond networks are envisioned to support a wide range of use cases for a myriad of industry sectors

  • The International Telecommunication Union (ITU) has classified 5G network services into three categories: enhanced Mobile Broadband, Ultra-Reliable and Low-Latency Communication (URLLC), and massive Machine-Type Communication. These services are suppose to coexist in the same network architecture by allocating network resources in such a way that the isolation among different inner logical networks is ensured through network slicing [1]

Read more

Summary

Introduction

The design of practical wiretap codes that achieve the secrecy capacity limit at the finite blocklength regime, and satisfy the constrains of MTC scenarios and heterogeneous environments (including highly dynamic or poor scattering environments where a strong correlation between legitimate and wiretap channels can occur [8]) remains a challenging task. Pursuing novel, robust and low-complex solutions for secret group-key generation schemes from physical layer characteristics is an appealing research area for providing security in MTC networks.

Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.