Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media
暂无分享,去创建一个
Ramón Alcarria | Borja Bordel Sánchez | Tomás Robles | Antonio Jara | T. Robles | Antonio Jara | R. Alcarria
[1] Hu Jinling. TD-SCDMA/TD-LTE evolution — Go Green , 2010, 2010 IEEE International Conference on Communication Systems.
[2] Preecha P. Yupapin,et al. Chaotic signal generation and cancellation using a micro ring resonator incorporating an optical add/drop multiplexer , 2007 .
[3] Heidrun Grob-Lipski,et al. Multiplexing gains achieved in pools of baseband computation units in 4G cellular networks , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[4] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[5] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[6] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[7] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[8] Christian Lanzani,et al. Advanced multimode radio for wireless & mobile broadband communication , 2009, 2009 European Wireless Technology Conference.
[9] Antti Toskala,et al. LTE Advanced: 3GPP Solution for IMT-Advanced , 2012 .
[10] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[11] Jemal H. Abawajy,et al. Detecting and Mitigating HX-DoS Attacks against Cloud Web Services , 2012, 2012 15th International Conference on Network-Based Information Systems.
[12] Tanesh Kumar,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[13] Donatella Darsena,et al. Cloud-Aided Cognitive Ambient Backscatter Wireless Sensor Networks , 2019, IEEE Access.
[14] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[15] K. Ikeda,et al. Optical Turbulence: Chaotic Behavior of Transmitted Light from a Ring Cavity , 1980 .
[16] Su Hu,et al. Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.
[17] Borja Bordel,et al. An Intra-slice Chaotic-Based Security Solution for Privacy Preservation in Future 5G Systems , 2018, WorldCIST.
[18] Donatella Darsena,et al. Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems , 2020, IEEE Transactions on Information Forensics and Security.
[19] Carsten Bockelmann,et al. Massive machine-type communications in 5g: physical and MAC-layer solutions , 2016, IEEE Communications Magazine.
[20] Kai-Kit Wong,et al. Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[21] K. Alan Shore,et al. Physics and applications of laser diode chaos , 2015 .
[22] Kwang-Cheng Chen,et al. Collaborative radio access of heterogeneous cloud radio access networks and edge computing networks , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[23] Wenbo Wang,et al. Physical layer security strategies for downlink heterogeneous cloud radio access networks , 2014 .
[24] Borja Bordel,et al. Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks , 2018, J. Internet Serv. Inf. Secur..
[25] Philip Levis,et al. OpenRadio: a programmable wireless dataplane , 2012, HotSDN '12.
[26] E. Snitzer. Optical fiber telecommunications , 1982, IEEE Journal of Quantum Electronics.
[27] SharmaShantanu,et al. A survey on 5G , 2016 .
[28] Diego Sánchez de Rivera,et al. Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[29] Qing Wang,et al. Wireless network cloud: Architecture and system requirements , 2010, IBM J. Res. Dev..
[30] Gilberto Berardinelli,et al. Achieving Ultra-Reliable Low-Latency Communications: Challenges and Envisioned System Enhancements , 2018, IEEE Network.
[31] Andrei V. Gurtov,et al. Enabling Secure Mobility with OpenFlow , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[32] Chongshan Ran,et al. Security XACML access control model based on SOAP encapsulate , 2011, 2011 International Conference on Computer Science and Service System (CSSS).
[33] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[34] Aleksandra Checko,et al. Optimizing small cell deployment by the use of C-RANs , 2014 .
[35] Kai Ying,et al. Coexistence of enhanced mobile broadband communications and ultra-reliable low-latency communications in mobile front-haul , 2018, OPTO.
[36] Umberto Spagnolini,et al. Cooperation and Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.
[37] Kai Yang. Interference management in LTE wireless networks [Industry Perspectives] , 2012, IEEE Wireless Communications.
[38] Felix Klaedtke,et al. A Security Architecture for 5G Networks , 2018, IEEE Access.
[39] Hong Wen,et al. 5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[40] Borja Bordel,et al. Virtualization-Based Techniques for the Design, Management and Implementation of Future 5G Systems with Network Slicing , 2018, WorldCIST.
[41] Michael S. Berger,et al. Cloud RAN for Mobile Networks—A Technology Overview , 2015, IEEE Communications Surveys & Tutorials.
[42] Alexandros Kaloxylos,et al. 5G Radio Access Network Architecture: Design Guidelines and Key Considerations , 2016, IEEE Communications Magazine.
[43] Sampath Rangarajan,et al. The case for re-configurable backhaul in cloud-RAN based small cell networks , 2013, 2013 Proceedings IEEE INFOCOM.
[44] R. Moussu,et al. Sur le théorème de Poincaré-Bendixson , 1974 .
[45] Hugo Thienpont,et al. Deterministic polarization chaos from a laser diode , 2012, Nature Photonics.
[46] Elaine Wong,et al. 5G C-RAN With Optical Fronthaul: An Analysis From a Deployment Perspective , 2018, Journal of Lightwave Technology.
[47] Ke Xiao,et al. Opportunistic Multicast NOMA with Security Concerns in a 5G Massive MIMO System , 2018, IEEE Communications Magazine.
[48] Mohsen Guizani,et al. 5G wireless backhaul networks: challenges and research advances , 2014, IEEE Network.
[49] R. M. A. P. Rajatheva,et al. Channel coding for enhanced mobile broadband communication in 5G systems , 2017, 2017 European Conference on Networks and Communications (EuCNC).
[50] Ramona Trestian,et al. 5G RADIO ACCESS NETWORKS: CENTRALIZED RAN, CLOUD-RAN AND VIRTUALIZATION OF SMALL CELLS , 2019 .
[51] Wei Yu,et al. Cloud Radio Access Networks: Principles, Technologies, and Applications , 2016 .
[52] Andrei V. Gurtov,et al. SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[53] Ning Wang,et al. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.
[54] Borja Bordel,et al. An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators , 2018, IEEE Access.
[55] Peng Zhang,et al. A Survey on C-RAN Security , 2017, IEEE Access.
[56] Troels E. Kolding,et al. Cloud RAN challenges and solutions , 2017, Ann. des Télécommunications.
[57] Yonggang Wen,et al. Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.
[58] Borja Bordel,et al. Service management in virtualization-based architectures for 5G systems with network slicing , 2020, Integr. Comput. Aided Eng..
[59] Borja Bordel,et al. Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments , 2018, IEEE Access.
[60] Ramón Alcarria,et al. Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions , 2019, Electronics.
[61] Olav Tirkkonen,et al. NB-IoT Technology Overview and Experience from Cloud-RAN Implementation , 2017, IEEE Wireless Communications.
[62] R. Poy,et al. Optical communication with chaotic waveforms , 1999, 1999 IEEE LEOS Annual Meeting Conference Proceedings. LEOS'99. 12th Annual Meeting. IEEE Lasers and Electro-Optics Society 1999 Annual Meeting (Cat. No.99CH37009).
[63] Shlomo Shamai,et al. Fronthaul quantization as artificial noise for enhanced secret communication in C-RAN , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[64] Borja Bordel,et al. Improving the Complexity of the Lorenz Dynamics , 2017, Complex..