Asian Journal of Research in Computer Science, 2021
Physical layer protection, which protects data confidentiality using information-theoretic method... more Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated. Review Article Jijo et al.; AJRCOS, 8(1): 1-20, 2021; Article no.AJRCOS.68058 2
Asian Journal of Research in Computer Science, 2021
Physical layer protection, which protects data confidentiality using information-theoretic method... more Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated. Review Article Jijo et al.; AJRCOS, 8(1): 1-20, 2021; Article no.AJRCOS.68058 2
Uploads
Papers by Sanaa Mohsin