K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath
{"title":"6G网络物理层安全干扰技术及抗干扰策略研究","authors":"K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath","doi":"10.1109/ICT52184.2021.9511465","DOIUrl":null,"url":null,"abstract":"In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G\",\"authors\":\"K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath\",\"doi\":\"10.1109/ICT52184.2021.9511465\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.\",\"PeriodicalId\":142681,\"journal\":{\"name\":\"2021 28th International Conference on Telecommunications (ICT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 28th International Conference on Telecommunications (ICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICT52184.2021.9511465\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 28th International Conference on Telecommunications (ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT52184.2021.9511465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G
In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.