{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:34:58Z","timestamp":1777656898381,"version":"3.51.4"},"reference-count":149,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T00:00:00Z","timestamp":1531094400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11432-017-9426-4","type":"journal-article","created":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T09:06:54Z","timestamp":1531386414000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["Overview of 5G security technology"],"prefix":"10.1007","volume":"61","author":[{"given":"Xinsheng","family":"Ji","sequence":"first","affiliation":[]},{"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Caixia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhou","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiangxing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,9]]},"reference":[{"key":"9426_CR1","unstructured":"3GPP SA. 3rd generation partnership project service and system aspects. http:\/\/www.3gpp.org\/specificationsgroups\/"},{"key":"9426_CR2","first-page":"551","volume":"44","author":"X H You","year":"2014","unstructured":"You X H, Pan Z W, Gao X Q, et al. The 5G mobile communication: the development trends and its emerging key techniques (in Chinese). Sin Chin Inform, 2014, 44: 551\u2013563","journal-title":"Sin Chin Inform"},{"key":"9426_CR3","first-page":"8","volume":"6","author":"K Z Huang","year":"2015","unstructured":"Huang K Z, Jin L, Zhao H. Study on the security threat and protection technologies of 5G. Des Tech Post Telecommun, 2015, 6: 8\u201312","journal-title":"Des Tech Post Telecommun"},{"key":"9426_CR4","unstructured":"3GPP. 3rd generation partnership project; technical specification group services and system aspects; study on the security aspects of the next generation system (Release 14). TR 33.899 version 1.3.0, 2017"},{"key":"9426_CR5","unstructured":"5GPP. 5G PPP phase1 security landscape produced by the 5G PPP security WG. 2017. https:\/\/5g-ppp.eu\/wp-content\/uploads\/2014\/02\/5G-PPP_White-Paper_Phase-1-Security-Landscape_June-2017.pdf"},{"key":"9426_CR6","unstructured":"NGMN. NGMN 5G white paper. http:\/\/ngmn.org\/5g-white-paper.html"},{"key":"9426_CR7","unstructured":"China Communications Standards Association (CCSA). Study on the 5G security technology. 2016. http:\/\/www.ccsa.org.cn\/tc\/meeting.php?meeting_id=5495"},{"key":"9426_CR8","unstructured":"China Communications Standards Association (CCSA). Technical requirement on 5G security. 2017. http:\/\/www.ccsa.org.cn\/tc\/meeting.php?meeting_id=5693"},{"key":"9426_CR9","unstructured":"Ericsson. 5G security: scenarios and solutions. 2015. http:\/\/www.ericsson.com\/cn\/res\/docs\/whitepapers\/wp-5gsecurity.pdf"},{"key":"9426_CR10","unstructured":"Datang Telecom Technology & Industry Group. Building a safe and secure cyberspace: 5G network security white paper (in Chinese). 2015"},{"key":"9426_CR11","volume-title":"Ltd. 5G: safety requirements and safety principles","author":"Huawei Technologies Co.","year":"2015","unstructured":"Huawei Technologies Co. Ltd. 5G: safety requirements and safety principles, Huawei white paper. 2015. https:\/\/max.book118.com\/html\/2017\/0709\/121290873.shtm"},{"key":"9426_CR12","unstructured":"Huawei Technologies Co. Ltd. 5G scenarios and security design. 2016. https:\/\/www-file.huawei.com\/-\/media\/CORPORATE\/PDF\/white%20paper\/5g-scenarios-and-security-design.pdf"},{"key":"9426_CR13","unstructured":"NOKIA Bell Labs. Securing 5G mobile networks built on distributed telco clouds. 2017. http:\/\/docbox.etsi.org\/Workshop\/2017\/201706_SECURITYWEEK\/06_5GSECURITY\/KEYNOTE_NOKIA_SCHNEIDER.pdf"},{"key":"9426_CR14","volume-title":"Proceedings of Cyber Sensing, International Society for Optics and Photonics, Baltimore","author":"J Uher","year":"2016","unstructured":"Uher J, Harper J, Mennecke R G, et al. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions. In: Proceedings of Cyber Sensing, International Society for Optics and Photonics, Baltimore, 2016"},{"key":"9426_CR15","doi-asserted-by":"publisher","first-page":"040301","DOI":"10.1007\/s11432-017-9045-1","volume":"60","author":"X F Tao","year":"2017","unstructured":"Tao X F, Han Y, Xu X D, et al. Recent advances and future challenges for mobile network virtualization. Sci China Inf Sci, 2017, 60: 040301","journal-title":"Sci China Inf Sci"},{"key":"9426_CR16","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","volume":"19","author":"Y L Liu","year":"2017","unstructured":"Liu Y L, Chen H H, Wang L M. Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutorials, 2017, 19: 347\u2013376","journal-title":"IEEE Commun Surv Tutorials"},{"key":"9426_CR17","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Y Duan","year":"2015","unstructured":"Duan X Y, Wang X B. Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun Mag, 2015, 53: 28\u201335","journal-title":"IEEE Commun Mag"},{"key":"9426_CR18","unstructured":"Future Forum 5G SIG. 5G: rethink mobile communications for 2020+ white paper. 2014. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/26809577"},{"key":"9426_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2017.7945854","volume":"55","author":"A Prasad","year":"2017","unstructured":"Prasad A, Benjebbour A, Bulakci O, et al. Agile radio resource management techniques for 5G new radio. IEEE Commun Mag, 2017, 55: 62\u201363","journal-title":"IEEE Commun Mag"},{"key":"9426_CR20","doi-asserted-by":"publisher","first-page":"100305","DOI":"10.1007\/s11432-017-9196-0","volume":"60","author":"Y H Sun","year":"2017","unstructured":"Sun Y H, Zhao M, Zhang S H, et al. Aggregation transmission scheme for machine type communications. Sci China Inf Sci, 2017, 60: 100305","journal-title":"Sci China Inf Sci"},{"key":"9426_CR21","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/MNET.2017.1700149","volume":"32","author":"B A Jayawickrama","year":"2018","unstructured":"Jayawickrama B A, He Y, Dutkiewicz E, et al. Scalable spectrum access system for massive machine type communication. IEEE Netw, 2018, 32: 154\u2013160","journal-title":"IEEE Netw"},{"key":"9426_CR22","volume-title":"Optimum ultra-reliable and low latency communications in 5G new radio","author":"S Y Lien","year":"2017","unstructured":"Lien S Y, Hung S C, Deng D J, et al. Optimum ultra-reliable and low latency communications in 5G new radio. In: Mobile Networks and Applications. Berlin: Springer, 2017"},{"key":"9426_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997466","volume-title":"Massive machine-type communication (mMTC) access with integrated authentication","author":"N K Pratas","year":"2017","unstructured":"Pratas N K, Pattathil S, Stefanovi\u0107 \u010c, et al. Massive machine-type communication (mMTC) access with integrated authentication. In: Proceedings of IEEE International Conference on Communications, Paris, 2017"},{"key":"9426_CR24","first-page":"205","volume":"5","author":"C N Mathur","year":"2007","unstructured":"Mathur C N, Subbalakshmi K P. A light weight enhancement to RC4 based security for resource constrained wireless devices. Int J Netw Secur, 2007, 5: 205\u2013212","journal-title":"Int J Netw Secur"},{"key":"9426_CR25","doi-asserted-by":"publisher","first-page":"25863","DOI":"10.1109\/ACCESS.2017.2768558","volume":"5","author":"J M Hamamreh","year":"2017","unstructured":"Hamamreh J M, Basar E, Arslan H. OFDM-subcarrier index selection for enhancing security and reliability of 5G URLLC services. IEEE Access, 2017, 5: 25863\u201325875","journal-title":"IEEE Access"},{"key":"9426_CR26","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2016.7497765","volume":"54","author":"C Hoymann","year":"2016","unstructured":"Hoymann C, Astely D, Stattin M, et al. LTE release 14 outlook. IEEE Commun Mag, 2016, 54: 44\u201349","journal-title":"IEEE Commun Mag"},{"key":"9426_CR27","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2017.1600679","volume":"55","author":"J B Ni","year":"2017","unstructured":"Ni J B, Zhang A Q, Lin X D, et al. Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun Mag, 2017, 55: 146\u2013152","journal-title":"IEEE Commun Mag"},{"key":"9426_CR28","unstructured":"Open Networking Foundation. Software defined networking: the new norm for networks. 2013. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/white-papers\/wp-sdn-newnorm.pdf"},{"key":"9426_CR29","unstructured":"ETSI. Network function virtualization: architectural framework. 2013. http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV\/001 099\/002\/01.01.01_60\/gs_NFV002v010101p.pdf"},{"key":"9426_CR30","doi-asserted-by":"publisher","first-page":"040303","DOI":"10.1007\/s11432-016-9013-0","volume":"60","author":"D Y Xu","year":"2017","unstructured":"Xu D Y, Ren P Y, Du Q H, et al. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci China Inf Sci, 2017, 60: 040303","journal-title":"Sci China Inf Sci"},{"key":"9426_CR31","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131970","volume-title":"SDN\/NFV-enabled security architecture for fine-grained policy enforcement and threat mitigation for enterprise networks","author":"B Pfaff","year":"2017","unstructured":"Pfaff B, Scherer J, Hock D, et al. SDN\/NFV-enabled security architecture for fine-grained policy enforcement and threat mitigation for enterprise networks. In: Proceedings of the SIGCOMM Posters and Demos, Los Angeles, 2017"},{"key":"9426_CR32","first-page":"3269","volume":"27","author":"N E Petroulakis","year":"2017","unstructured":"Petroulakis N E, Fysarakis K, Askoxylakis I, et al. Reactive security for SDN\/NFV-enabled industrial networks leveraging service function chaining. Trans Emerg Telecomun Technol, 2017, 27: 3269","journal-title":"Trans Emerg Telecomun Technol"},{"key":"9426_CR33","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","volume":"55","author":"J Ordonez-Lucena","year":"2017","unstructured":"Ordonez-Lucena J, Ameigeiras P, Lopez D, et al. Network slicing for 5G with SDN\/NFV: concepts, architectures, and challenges. IEEE Commun Mag, 2017, 55: 80\u201387","journal-title":"IEEE Commun Mag"},{"key":"9426_CR34","volume-title":"Cryptography and Secure Communications","author":"M Y Rhee","year":"1993","unstructured":"Rhee M Y. Cryptography and Secure Communications. New York: McGraw-Hill, 1993"},{"key":"9426_CR35","first-page":"181","volume-title":"Proceedings of IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki","author":"XW Zhang","year":"2017","unstructured":"Zhang XW, Kunz A, Schr\u00f6der S. Overview of 5G security in 3GPP. In: Proceedings of IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, 2017. 181\u2013186"},{"key":"9426_CR36","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1002\/ett.3142","volume":"28","author":"S Soderi","year":"2017","unstructured":"Soderi S, Mucchi L, H\u00e4m\u00e4l\u00e4inen M, et al. Physical layer security based on spread-spectrum watermarking and jamming receiver. Trans Emerg Telecommun Technol, 2017, 28: 3142","journal-title":"Trans Emerg Telecommun Technol"},{"key":"9426_CR37","doi-asserted-by":"publisher","first-page":"021301","DOI":"10.1007\/s11432-017-9262-8","volume":"61","author":"L M Li","year":"2018","unstructured":"Li L M, Wang D M, Niu X K, et al. mmWave communications for 5G: implementation challenges and advances. Sci China Inf Sci, 2018, 61: 021301","journal-title":"Sci China Inf Sci"},{"key":"9426_CR38","first-page":"2900","volume":"38","author":"X S Ji","year":"2016","unstructured":"Ji X S, Yang J, Huang K Z, et al. Physical layer authentication scheme based on Hash method. J Electron Inf Technol, 2016, 38: 2900\u20132907","journal-title":"J Electron Inf Technol"},{"key":"9426_CR39","volume-title":"Research on authentication schemes based on physical layer security","author":"J Yang","year":"2016","unstructured":"Yang J. Research on authentication schemes based on physical layer security. Dissertation for Master Degree. Zhengzhou: PLA Information Engineering University, 2016"},{"key":"9426_CR40","doi-asserted-by":"publisher","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","volume":"6","author":"G A Akpakwu","year":"2018","unstructured":"Akpakwu G A, Silva B J, Hancke G P, et al. A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access, 2018, 6: 3619\u20133647","journal-title":"IEEE Access"},{"key":"9426_CR41","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MWC.2016.1400374RP","volume":"24","author":"J Zhang","year":"2017","unstructured":"Zhang J, Ge X H, Li Q, et al. 5G millimeter-wave antenna array: design and challenges. IEEE Wirel Commun, 2017, 24: 106\u2013112","journal-title":"IEEE Wirel Commun"},{"key":"9426_CR42","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2017.07.002","volume":"96","author":"P Gandotra","year":"2017","unstructured":"Gandotra P, Jha R K. A survey on green communication and security challenges in 5G wireless communication networks. J Netw Comput Appl, 2017, 96: 39\u201361","journal-title":"J Netw Comput Appl"},{"key":"9426_CR43","doi-asserted-by":"crossref","DOI":"10.1201\/9781315382586","volume-title":"Data Mining: a Tutorial-Based Primer","author":"R J Roiger","year":"2017","unstructured":"Roiger R J. Data Mining: a Tutorial-Based Primer. Boca Raton: CRC Press, 2017"},{"key":"9426_CR44","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta A, Jha R K. A survey of 5G network: architecture and emerging technologies. IEEE Access, 2015, 3: 1206\u20131232","journal-title":"IEEE Access"},{"key":"9426_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/9781119293071.ch12","volume-title":"User privacy, identity and trust in 5G","author":"T Kumar","year":"2018","unstructured":"Kumar T, Liyanage M, Ahmad I, et al. User privacy, identity and trust in 5G. In: A Comprehensive Guide to 5G Security. Hoboken: Wiley, 2018"},{"key":"9426_CR46","first-page":"1","volume":"1","author":"J X Wu","year":"2016","unstructured":"Wu J X. Research on network space mimicry defense technology. Cyber Secur, 2016, 1: 1\u201310","journal-title":"Cyber Secur"},{"key":"9426_CR47","first-page":"40","volume":"1","author":"H C Hu","year":"2016","unstructured":"Hu H C, Chen F C, Wang Z P. Several issues and performance evaluation of pseudo mimicry defense DHR model. Cyber Secur, 2016, 1: 40\u201351","journal-title":"Cyber Secur"},{"key":"9426_CR48","first-page":"30","volume":"2","author":"J X Wu","year":"2017","unstructured":"Wu J X. A brief introduction to cyberspace mimicry defense principle. Civil Mil Integration, 2017, 2: 30\u201335","journal-title":"Civil Mil Integration"},{"key":"9426_CR49","first-page":"4","volume":"10","author":"J X Wu","year":"2014","unstructured":"Wu J X. Nextwork space mimicry defense technology (in Chinese). Secrecy Sci Technol, 2014, 10: 4\u20139","journal-title":"Secrecy Sci Technol"},{"key":"9426_CR50","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1049\/iet-com.2013.0735","volume":"8","author":"X S Ji","year":"2014","unstructured":"Ji X S, Huang K Z, Wen H, et al. Achieving strong security based on fountain code with coset pre-coding. IET Commun, 2014, 8: 2476\u20132483","journal-title":"IET Commun"},{"key":"9426_CR51","doi-asserted-by":"publisher","first-page":"183","DOI":"10.4218\/etrij.14.0213.0090","volume":"36","author":"X Y Li","year":"2014","unstructured":"Li X Y, Wang X, Xu X, et al. A distributed implementation algorithm for physical layer security based on untrusted relay cooperation and artificial noise. ETRI J, 2014, 36: 183\u2013186","journal-title":"ETRI J"},{"key":"9426_CR52","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/CC.2015.7386163","volume":"12","author":"X S Ji","year":"2015","unstructured":"Ji X S, Kang X, Huang K Z, et al. The full-duplex artificial noise scheme for security of a cellular system. China Commun, 2015, 12: 150\u2013156","journal-title":"China Commun"},{"key":"9426_CR53","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang N, Wang L F, Geraci G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20\u201327","journal-title":"IEEE Commun Mag"},{"key":"9426_CR54","first-page":"020300","volume":"59","author":"C X Wang","year":"2016","unstructured":"Wang C X, You X H, Wang J, et al. Special focus on 5G wireless communication networks. Sci China Inf Sci, 2016, 59: 020300","journal-title":"Sci China Inf Sci"},{"key":"9426_CR55","volume-title":"Reseach on secure coding and transmission mechanism under equivalent channel feature variable model","author":"Z Zhong","year":"2013","unstructured":"Zhong Z. Reseach on secure coding and transmission mechanism under equivalent channel feature variable model. Dissertation for Ph.D. Degree. Zhengzhou: PLA Information Engineering University, 2013"},{"key":"9426_CR56","first-page":"1121","volume":"39","author":"R Ahlswede","year":"1993","unstructured":"Ahlswede R, Csiszar I. Common randomness in information theory and cryptography. Part I: Secret sharing. IEEE Trans Inf Theory, 1993, 39: 1121\u20131132","journal-title":"Part I: Secret sharing. IEEE Trans Inf Theory"},{"key":"9426_CR57","doi-asserted-by":"publisher","first-page":"100307","DOI":"10.1007\/s11432-017-9195-3","volume":"60","author":"Y Huang","year":"2017","unstructured":"Huang Y, Jin L, Li N, et al. Secret key generation based on private pilot under man-in-the-middle attack. Sci China Inf Sci, 2017, 60: 100307","journal-title":"Sci China Inf Sci"},{"key":"9426_CR58","doi-asserted-by":"publisher","first-page":"3776","DOI":"10.1109\/TAP.2005.858853","volume":"53","author":"T Aono","year":"2005","unstructured":"Aono T, Higuchi K, Ohira T, et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans Antenn Propag, 2005, 53: 3776\u20133784","journal-title":"IEEE Trans Antenn Propag"},{"key":"9426_CR59","volume-title":"Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics","author":"A Sayeed","year":"2008","unstructured":"Sayeed A, Perrig A. Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008. 3013\u20133016"},{"key":"9426_CR60","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TMC.2010.114","volume":"10","author":"C Chen","year":"2011","unstructured":"Chen C, Jensen M A. Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans Mobile Comput, 2011, 10: 205\u2013215","journal-title":"IEEE Trans Mobile Comput"},{"key":"9426_CR61","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/TCOMM.2016.2519402","volume":"64","author":"H M Wang","year":"2016","unstructured":"Wang H M, Zheng T X, Yuan J, et al. Physical layer security in heterogeneous cellular networks. IEEE Trans Commun, 2016, 64: 1204\u20131219","journal-title":"IEEE Trans Commun"},{"key":"9426_CR62","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/JSAC.2015.2416984","volume":"33","author":"T J Lv","year":"2015","unstructured":"Lv T J, Gao H, Yang S S. Secrecy transmit beamforming for heterogeneous networks. IEEE J Sel Areas Commun, 2015, 33: 1154\u20131170","journal-title":"IEEE J Sel Areas Commun"},{"key":"9426_CR63","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong L, Han Z, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process, 2010, 58: 1875\u20131888","journal-title":"IEEE Trans Signal Process"},{"key":"9426_CR64","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"Zheng G, Choo L C, Wong K K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans Signal Process, 2011, 59: 1317\u20131322","journal-title":"IEEE Trans Signal Process"},{"key":"9426_CR65","doi-asserted-by":"publisher","first-page":"5651","DOI":"10.1109\/TWC.2016.2565579","volume":"15","author":"R Q Zhang","year":"2016","unstructured":"Zhang R Q, Cheng X, Yang L Q. Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks. IEEE Trans Wirel Commun, 2016, 15: 5651\u20135663","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR66","doi-asserted-by":"publisher","first-page":"029305","DOI":"10.1007\/s11432-016-9201-7","volume":"61","author":"C Xu","year":"2018","unstructured":"Xu C, Zeng P, Liang W, et al. Secure resource allocation for green and cognitive device-to-device communication. Sci China Inf Sci, 2018, 61: 029305","journal-title":"Sci China Inf Sci"},{"key":"9426_CR67","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2015.7341120","volume-title":"Safeguarding massive MIMO aided hetnets using physical layer security","author":"Y S Deng","year":"2015","unstructured":"Deng Y S, Wang L F, Wong K K, et al. Safeguarding massive MIMO aided hetnets using physical layer security. In: Proceedings of IEEE International Conference on Wireless Communications & Signal Processing, Nanjing, 2015"},{"key":"9426_CR68","doi-asserted-by":"publisher","first-page":"4766","DOI":"10.1109\/TWC.2014.2337308","volume":"13","author":"J Zhu","year":"2014","unstructured":"Zhu J, Schober R, Bhargava V K. Secure transmission in multicell massive MIMO systems. IEEE Trans Wirel Commun, 2014, 13: 4766\u20134781","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR69","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TWC.2015.2500578","volume":"15","author":"J Zhu","year":"2016","unstructured":"Zhu J, Schober R, Bhargava V K. Linear precoding of data and artificial noise in secure massive MIMO systems. IEEE Trans Wirel Commun, 2016, 15: 2245\u20132261","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR70","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","volume":"53","author":"D Kapetanovic","year":"2015","unstructured":"Kapetanovic D, Zheng G, Rusek F. Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun Mag, 2015, 53: 21\u201327","journal-title":"IEEE Commun Mag"},{"key":"9426_CR71","doi-asserted-by":"publisher","first-page":"5569","DOI":"10.1109\/TWC.2016.2562010","volume":"15","author":"C Wang","year":"2016","unstructured":"Wang C, Wang H M. Physical layer security in millimeter wave cellular networks. IEEE Trans Wirel Commun, 2016, 15: 5569\u20135585","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR72","doi-asserted-by":"publisher","first-page":"3205","DOI":"10.1109\/TWC.2017.2676087","volume":"16","author":"Y X Zhu","year":"2017","unstructured":"Zhu Y X, Wang L F, Wong K K, et al. Secure communications in millimeter wave Ad hoc networks. IEEE Trans Wirel Commun, 2017, 16: 3205\u20133217","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR73","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1109\/JSAC.2017.2719924","volume":"35","author":"M Xiao","year":"2017","unstructured":"Xiao M, Mumtaz S, Huang Y M, et al. Millimeter wave communications for future mobile networks. IEEE J Sel Areas Commun, 2017, 35: 1909\u20131935","journal-title":"IEEE J Sel Areas Commun"},{"key":"9426_CR74","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510755","volume-title":"Physical security for 5G non-orthogonal multiple access in large-scale networks","author":"Z J Qin","year":"2016","unstructured":"Qin Z J, Liu Y W, Ding Z G, et al. Physical security for 5G non-orthogonal multiple access in large-scale networks. In: Proceedings of IEEE International Conference on Communications, Kuala Lumpur, 2016"},{"key":"9426_CR75","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TWC.2017.2650987","volume":"16","author":"Y W Liu","year":"2017","unstructured":"Liu Y W, Qin Z J, Elkashlan M, et al. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans Wirel Commun, 2017, 16: 1656\u20131672","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR76","volume-title":"Noma in 5G systems: existing possibilities for enhancing spectral efficiency","author":"S M Islam","year":"2017","unstructured":"Islam S M, Zeng M, Dobre O A. Noma in 5G systems: existing possibilities for enhancing spectral efficiency. 2017. ArXiv:1706.08215"},{"key":"9426_CR77","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TMC.2010.189","volume":"10","author":"N Patwari","year":"2011","unstructured":"Patwari N, Kasera S K. Temporal link signature measurements for location distinction. IEEE Trans Mobile Comput, 2011, 10: 449\u2013462","journal-title":"IEEE Trans Mobile Comput"},{"key":"9426_CR78","first-page":"4646","volume-title":"Proceedings of IEEE International Conference on Communications, Glasgow","author":"L Xiao","year":"2007","unstructured":"Xiao L, Greenstein L J, Mandayam N B, et al. Fingerprints in the ether: using the physical layer for wireless authentication. In: Proceedings of IEEE International Conference on Communications, Glasgow, 2007. 4646\u20134651"},{"key":"9426_CR79","doi-asserted-by":"publisher","first-page":"7474","DOI":"10.1109\/TVT.2017.2652484","volume":"66","author":"L Xiao","year":"2017","unstructured":"Xiao L, Chen T H, Han G A, et al. Game theoretic study on channel-based authentication in MIMO systems. IEEE Trans Veh Technol, 2017, 66: 7474\u20137484","journal-title":"IEEE Trans Veh Technol"},{"key":"9426_CR80","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511624","volume-title":"Energy-based anchor node selection for IoT physical layer authentication","author":"G Caparra","year":"2016","unstructured":"Caparra G, Centenaro M, Laurenti N, et al. Energy-based anchor node selection for IoT physical layer authentication. In: Proceedings of IEEE International Conference on Communications, Kuala Lumpur, 2016"},{"key":"9426_CR81","doi-asserted-by":"publisher","first-page":"7808","DOI":"10.1109\/ACCESS.2017.2700330","volume":"5","author":"M M U Rahman","year":"2017","unstructured":"Rahman M M U, Abbasi Q H, Chopra N, et al. Physical layer authentication in Nano networks at terahertz frequencies for biomedical applications. IEEE Access, 2017, 5: 7808\u20137815","journal-title":"IEEE Access"},{"key":"9426_CR82","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/MCOM.2016.7498103","volume":"54","author":"X B Wang","year":"2016","unstructured":"Wang X B, Hao P, Hanzo L. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Commun Mag, 2016, 54: 152\u2013158","journal-title":"IEEE Commun Mag"},{"key":"9426_CR83","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510994","volume-title":"Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information","author":"X Y Duan","year":"2016","unstructured":"Duan X Y, Wang X B. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information. In: Proceedings of IEEE International Conference on Communications, Kuala Lumpur, 2016"},{"key":"9426_CR84","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JSAC.2013.130914","volume":"31","author":"D Shan","year":"2013","unstructured":"Shan D, Zeng K, Xiang W D, et al. PHY-CRAM: physical layer challenge-response authentication mechanism for wireless networks. IEEE J Sel Areas Commun, 2013, 31: 1817\u20131827","journal-title":"IEEE J Sel Areas Commun"},{"key":"9426_CR85","first-page":"1276","volume-title":"Proceedings of IEEE International Conference on Computer Communications, Toronto","author":"X R Du","year":"2014","unstructured":"Du X R, Shan D, Zeng K, et al. Physical layer challenge-response authentication in wireless networks with relay. In: Proceedings of IEEE International Conference on Computer Communications, Toronto, 2014. 1276\u20131284"},{"key":"9426_CR86","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/LCOMM.2014.2375191","volume":"19","author":"X F Wu","year":"2015","unstructured":"Wu X F, Yang Z. Physical-layer authentication for multi-carrier transmission. IEEE Commun Lett, 2015, 19: 74\u201377","journal-title":"IEEE Commun Lett"},{"key":"9426_CR87","doi-asserted-by":"publisher","first-page":"6611","DOI":"10.1109\/TWC.2016.2586472","volume":"15","author":"X F Wu","year":"2016","unstructured":"Wu X F, Yang Z, Ling C, et al. Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun, 2016, 15: 6611\u20136625","journal-title":"IEEE Trans Wirel Commun"},{"key":"9426_CR88","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425519","volume-title":"A novel framework for message authentication in vehicular communication networks","author":"H Wen","year":"2009","unstructured":"Wen H, Ho P H, Gong G. A novel framework for message authentication in vehicular communication networks. In: Proceedings of IEEE International Conference on Global Telecommunications, Honolulu, 2009"},{"key":"9426_CR89","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1049\/iet-com.2012.0300","volume":"7","author":"Y F Wang","year":"2013","unstructured":"Wang Y F, Zhou L, Zhu X P, et al. Physical layer assist authentication technique for smart meter system. IET Commun, 2013, 7: 189\u2013197","journal-title":"IET Commun"},{"key":"9426_CR90","volume-title":"A physical-layer authentication assisted scheme for enhancing 3GPP authentication. Mathematics","author":"X F Wu","year":"2015","unstructured":"Wu X F, Yan Z, Ling C, et al. A physical-layer authentication assisted scheme for enhancing 3GPP authentication. Mathematics, 2015. ArXiv:1502.07565"},{"key":"9426_CR91","first-page":"3747","volume":"11","author":"J Yang","year":"2017","unstructured":"Yang J, Ji X S, Huang K Z, et al. AKA-PLA: enhanced AKA based on physical layer authentication. KSII Trans Int Inf Syst, 2017, 11: 3747\u20133765","journal-title":"KSII Trans Int Inf Syst"},{"key":"9426_CR92","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U M Maurer","year":"1993","unstructured":"Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39: 733\u2013742","journal-title":"IEEE Trans Inf Theory"},{"key":"9426_CR93","first-page":"2612","volume":"38","author":"X Wang","year":"2016","unstructured":"Wang X, Jin L, Song H W, et al. Physical layer security key capacity based on wireless channel parameters. J Electron Inf Technol, 2016, 38: 2612\u20132618","journal-title":"J Electron Inf Technol"},{"key":"9426_CR94","first-page":"75","volume":"37","author":"X Wang","year":"2016","unstructured":"Wang X, Jin L, Liu L, et al. Analysis of physical layer security key capacity in uniform scattering environment. J Commun, 2016, 37: 75\u201381","journal-title":"J Commun"},{"key":"9426_CR95","first-page":"597","volume-title":"Proceedings of IEEE International Symposium on Wireless Communication Systems, Poznan","author":"H M Furqan","year":"2016","unstructured":"Furqan H M, Hamamreh J M, Arslan H. Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In: Proceedings of IEEE International Symposium on Wireless Communication Systems, Poznan, 2016. 597\u2013602"},{"key":"9426_CR96","doi-asserted-by":"publisher","first-page":"4823","DOI":"10.1109\/TVT.2016.2611565","volume":"66","author":"H Taha","year":"2017","unstructured":"Taha H, Alsusa E A. Secret key exchange using private random precoding in MIMO FDD and TDD systems. IEEE Trans Veh Technol, 2017, 66: 4823\u20134833","journal-title":"IEEE Trans Veh Technol"},{"key":"9426_CR97","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/JSAC.2012.120924","volume":"30","author":"L F Lai","year":"2012","unstructured":"Lai L F, Liang Y B, Du W L. Cooperative key generation in wireless networks. IEEE J Sel Areas Commun, 2012, 30: 1578\u20131588","journal-title":"IEEE J Sel Areas Commun"},{"key":"9426_CR98","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TIFS.2013.2293113","volume":"9","author":"N Wang","year":"2014","unstructured":"Wang N, Zhang N, Gulliver T A. Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Trans Inf Foren Secur, 2014, 9: 272\u2013284","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"9426_CR99","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1109\/TIFS.2015.2462756","volume":"10","author":"K Chen","year":"2015","unstructured":"Chen K, Natarajan B, Shattil S. Secret key generation rate with power allocation in relay-based LTE-A networks. IEEE Trans Inf Foren Secur, 2015, 10: 2424\u20132434","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"9426_CR100","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10470-017-0941-3","volume":"91","author":"C L K Ngassa","year":"2017","unstructured":"Ngassa C L K, Moli\u00b4ere R, Delaveau F, et al. Secret key generation scheme from WiFi and LTE reference signals. Analog Integ Circ Signal Process, 2017, 91: 277\u2013292","journal-title":"Analog Integ Circ Signal Process"},{"key":"9426_CR101","volume-title":"New proposal about requirement and evaluation criteria of technologies to enhance security and privacy of radio communications. ITU-R66 WRC-19","author":"ITU.","year":"2016","unstructured":"ITU. New proposal about requirement and evaluation criteria of technologies to enhance security and privacy of radio communications. ITU-R66 WRC-19, 2016"},{"key":"9426_CR102","volume-title":"Proposal for studies related to the security of machine-type communications and internet of things","author":"ITU.","year":"2016","unstructured":"ITU. Proposal for studies related to the security of machine-type communications and internet of things. ITU-R66 WRC-19, 2016"},{"key":"9426_CR103","volume-title":"Enhanced protections using physical layer security","author":"Thales.","year":"2016","unstructured":"Thales. Enhanced protections using physical layer security. 3GPP TSG SA WG3 #82 S3-160267, 2016"},{"key":"9426_CR104","volume-title":"PCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-time identifiers based on channel estimation","author":"Thales.","year":"2016","unstructured":"Thales. PCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-time identifiers based on channel estimation. 3GPP TSG SA WG3 #85 S3-161639, 2016"},{"key":"9426_CR105","volume-title":"Study on architecture and security for nest generation system","author":"Thales.","year":"2016","unstructured":"Thales. Study on architecture and security for nest generation system. 3GPP TSG SA WG3 #82 S3-160278, 2016"},{"key":"9426_CR106","unstructured":"ISO\/IEC 29192. Information technology-security techniques-lightweight cryptography\u2013part 1: general\/part 2: block ciphers\/part 3: stream ciphers\/part 4: mechanisms using asymmetric techniques. 2016"},{"key":"9426_CR107","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Proceedings of International Conference on Information Security, Samos","author":"C Canni\u00e8re","year":"2006","unstructured":"Canni\u00e8re C, Preneel B. Trivium: a stream cipher construction inspired by block cipher design principles. In: Proceedings of International Conference on Information Security, Samos, 2006. 171\u2013186"},{"key":"9426_CR108","first-page":"450","volume-title":"Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Vienna","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450\u2013466"},{"key":"9426_CR109","first-page":"181","volume-title":"Proceedings of the 14th international conference on Fast Software Encryption, Luxembourg","author":"T Shirai","year":"2007","unstructured":"Shirai T, Shibutani K, Akishita T, et al. The 128-bit blockcipher CLEFIA. In: Proceedings of the 14th international conference on Fast Software Encryption, Luxembourg, 2007. 181\u2013195"},{"key":"9426_CR110","first-page":"57","volume-title":"Proceedings of International Cryptology Conference, Santa Barbara","author":"M R Albrecht","year":"2014","unstructured":"Albrecht M R, Driessen B, Kavun E B, et al. Block ciphers-focus on the linear layer. In: Proceedings of International Cryptology Conference, Santa Barbara, 2014. 57\u201376"},{"key":"9426_CR111","volume-title":"Performance of the SIMON and SPECK Family of Lightweight Block Ciphers","author":"R Beaulieuand","year":"2014","unstructured":"Beaulieuand R, Shors D, Smith J, et al. Performance of the SIMON and SPECK Family of Lightweight Block Ciphers. National Security Agency Technical Report, 2014"},{"key":"9426_CR112","first-page":"306","volume-title":"Proceedings of International Conference on Cryptology in Africa, Ifrance","author":"T P Berger","year":"2012","unstructured":"Berger T P, Hayer J D, et al. The GLUON family; a lightweight Hash function family based on FCSRs. In: Proceedings of International Conference on Cryptology in Africa, Ifrance, 2012. 306\u2013323"},{"key":"9426_CR113","first-page":"79","volume-title":"Proceedings of the 2nd International Conference on Big Data Security on Cloud, New York","author":"G Bansod","year":"2016","unstructured":"Bansod G, Patil A, Sutar S, et al. An ultra lightweight encryption design for security in pervasive computing. In: Proceedings of the 2nd International Conference on Big Data Security on Cloud, New York, 2016. 79\u201384"},{"key":"9426_CR114","first-page":"144","volume-title":"Proceedings of the 12th International Conference on Innovations in Information Technology, Al-Ain","author":"A Z Alshamsi","year":"2016","unstructured":"Alshamsi A Z, Barka E S, Serhani M A. Lightweight encryption algorithm in wireless body area network for e-health monitoring. In: Proceedings of the 12th International Conference on Innovations in Information Technology, Al-Ain, 2016. 144\u2013150"},{"key":"9426_CR115","first-page":"1","volume":"2016","author":"C Y Peng","year":"2016","unstructured":"Peng C Y, Du X J, Li K Q, et al. An ultra-lightweight encryption scheme in underwater acoustic networks. J Sensor, 2016, 2016: 1\u201310","journal-title":"J Sensor"},{"key":"9426_CR116","first-page":"491","volume-title":"Proceedings of the 41st Annual Computer Software and Applications Conference, Turin","author":"E K Win","year":"2017","unstructured":"Win E K, Yoshihisa T, Yoshimasa I, et al. A lightweight multi-receiver encryption scheme with mutual authentication. In: Proceedings of the 41st Annual Computer Software and Applications Conference, Turin, 2017. 491\u2013497"},{"key":"9426_CR117","first-page":"1","volume":"8","author":"M Usman","year":"2017","unstructured":"Usman M, Ahmed I, Aslam M I, et al. SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl, 2017, 8: 1\u201310","journal-title":"Int J Adv Comput Sci Appl"},{"key":"9426_CR118","volume-title":"IEEE Trans Emerg Top Comput","author":"S Tahir","year":"2017","unstructured":"Tahir S, Ruj S, Rahulamathavan Y, et al. A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans Emerg Top Comput, 2017. doi: 10.1109\/TETC.2017.2737789"},{"key":"9426_CR119","first-page":"26","volume-title":"Proceedings of IEEE International Conference on Secure Internet of Things Workshop, Taipei","author":"C T Zenger","year":"2014","unstructured":"Zenger C T, Chur M J, Posoclck J F, et al. A novel key generating architecture for wireless low-resource devices. In: Proceedings of IEEE International Conference on Secure Internet of Things Workshop, Taipei, 2014. 26\u201334"},{"key":"9426_CR120","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996924","volume-title":"On-the-fly secure key generation with deterministic models","author":"R Fritschek","year":"2017","unstructured":"Fritschek R, Wunder G. On-the-fly secure key generation with deterministic models. In: Proceedings of IEEE International Conference on Communications, Paris, 2017"},{"key":"9426_CR121","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/JIOT.2015.2391113","volume":"2","author":"L Shi","year":"2015","unstructured":"Shi L, Yuan J W, Yu S C, et al. MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks. IEEE Int Things J, 2015, 2: 52\u201362","journal-title":"IEEE Int Things J"},{"key":"9426_CR122","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/TVT.2014.2342714","volume":"64","author":"O Gungor","year":"2015","unstructured":"Gungor O, Chen F Z, Koksal C E. Secret key generation via localization and mobility. IEEE Trans Veh Technol, 2015, 64: 2214\u20132230","journal-title":"IEEE Trans Veh Technol"},{"key":"9426_CR123","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1007\/s11432-012-4570-2","volume":"55","author":"W J Wang","year":"2012","unstructured":"Wang W J, Jiang H Y, Xia X G, et al. A wireless secret key generation method based on Chinese remainder theorem in FDD systems. Sci China Inf Sci, 2012, 55: 1605\u20131616","journal-title":"Sci China Inf Sci"},{"key":"9426_CR124","first-page":"362","volume":"47","author":"Y M Lou","year":"2017","unstructured":"Lou Y M, Jin L, Zhong Z, et al. Secret key generation scheme based on MIMO received signal spaces (in Chinese). Sin Chin Inform, 2017, 47: 362\u2013373","journal-title":"Sin Chin Inform"},{"key":"9426_CR125","volume-title":"5G network technology framework","author":"IMT-2020 5G Propulsion Group.","year":"2015","unstructured":"IMT-2020 (5G) Propulsion Group. 5G network technology framework. 2015. http:\/\/www.imt-2020.cn\/zh\/documents\/1"},{"key":"9426_CR126","volume-title":"5G security recommendations package #2: network slicing","author":"NGMN.","year":"2016","unstructured":"NGMN. 5G security recommendations package #2: network slicing. 2016. http:\/\/ngmn.org\/5g-white-paper.html"},{"key":"9426_CR127","volume-title":"3rd generation partnership project; technical specification group services and system aspects; study on the security aspects of the next generation system (Release 14)","author":"3GPP.","year":"2017","unstructured":"3GPP. 3rd generation partnership project; technical specification group services and system aspects; study on the security aspects of the next generation system (Release 14). TR 33.899 Version 1.1.0, 2017"},{"key":"9426_CR128","unstructured":"China Mobile Communications Corporation, Huawei Technologies Co., Ltd., Deutsche Telekom AG, Volkswagen. 5G service-guaranteed network slicing white paper. 2017. https:\/\/www.huawei.com\/ch-en\/industry-insights\/outlook\/mbb-2020\/trends-insights\/5g-service-guaranteed-network-slicing-whitepaper"},{"key":"9426_CR129","volume-title":"Study on subscriber privacy impact in 3GPP","author":"3GPP.","year":"2016","unstructured":"3GPP. Study on subscriber privacy impact in 3GPP (Release 14). TR 33.849 Version 2.0.0, 2016"},{"key":"9426_CR130","volume-title":"Feasibility study on new services and markets technology enablers for network operation (Release 15)","author":"3GPP.","year":"2016","unstructured":"3GPP. Feasibility study on new services and markets technology enablers for network operation (Release 15). TR 22.864 Version 15.0.0, 2016"},{"key":"9426_CR131","volume-title":"Study on new services and markets technology enablers (Release 9)","author":"3GPP.","year":"2016","unstructured":"3GPP. Study on new services and markets technology enablers (Release 9). TR 22.891 Version 14.2.0, 2016"},{"key":"9426_CR132","volume-title":"Service requirements for V2X services (Release 14)","author":"3GPP.","year":"2017","unstructured":"3GPP. Service requirements for V2X services (Release 14). TS 22.185 Version 14.3.0, 2017"},{"key":"9426_CR133","doi-asserted-by":"publisher","first-page":"847","DOI":"10.3724\/SP.J.1016.2009.00847","volume":"32","author":"S G Zhou","year":"2009","unstructured":"Zhou S G, Li F, Tao Y F, et al. Privacy preservation in database applications: a survey. Chin J Comput, 2009, 32: 847\u2013861","journal-title":"Chin J Comput"},{"key":"9426_CR134","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl-Based Syst, 2002, 10: 557\u2013570","journal-title":"Int J Uncertain Fuzz Knowl-Based Syst"},{"key":"9426_CR135","volume-title":"L-diversity: privacy beyond k-anonymity","author":"A Machanavajjhala","year":"2006","unstructured":"Machanavajjhala A, Kifer D, Gehrke J. L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, Atlanta, 2006"},{"key":"9426_CR136","first-page":"106","volume-title":"Proceedings of the 23rd International Conference on Data Engineering, Istanbul","author":"N H Li","year":"2007","unstructured":"Li N H, li T C, Venkatasubramanian S. T-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, Istanbul, 2007. 106\u2013115"},{"key":"9426_CR137","volume-title":"Differential privacy: a survey of results","author":"C Dwork","year":"2008","unstructured":"Dwork C. Differential privacy: a survey of results. In: Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, Xi\u2019an, 2008"},{"key":"9426_CR138","volume-title":"IETF standard RFC","author":"Internet Engineering Task Force.","year":"2015","unstructured":"Internet Engineering Task Force. Representation of uncertainty and confidence in the presence information data format location object (PIDF-LO). IETF standard RFC 7459\u20132015. https:\/\/buildbot.tools.ietf.org\/html\/rfc7459"},{"key":"9426_CR139","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri R. Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans Mobile Comput, 2013, 12: 2360\u20132372","journal-title":"IEEE Trans Mobile Comput"},{"key":"9426_CR140","first-page":"733","volume-title":"Proceedings of the 29th IEEE Internation Conference on Data Engineering, Brisbane","author":"B Yao","year":"2013","unstructured":"Yao B, Li F F, Xiao X K. Secure nearest neighbor revisited. In: Proceedings of the 29th IEEE Internation Conference on Data Engineering, Brisbane, 2013. 733\u2013744"},{"key":"9426_CR141","first-page":"305","volume-title":"Proceedings of the 14th IEEE International Conference on Mobile Data Management, Milan","author":"C Stach","year":"2013","unstructured":"Stach C, Mitschang B. Privacy management for mobile platforms\u2013a review of concepts and approaches. In: Proceedings of the 14th IEEE International Conference on Mobile Data Management, Milan, 2013. 305\u2013313"},{"key":"9426_CR142","volume-title":"The 2nd conference of future forum information security group","author":"Future-Forum.","year":"2017","unstructured":"Future-Forum. The 2nd conference of future forum information security group. 5G security white paper framework recommendations. 2017. http:\/\/www.future-forum.org\/2009cn\/download_list.asp?classid=%B9%A4%D7%F7%D7%E9%CE%C4%B5%B5"},{"key":"9426_CR143","volume-title":"Bitcoin: a peer-to-peer electronic cash system.","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008. https:\/\/bitcoin.org\/en\/bitcoin-paper"},{"key":"9426_CR144","unstructured":"Ruubel M. Guardtime federal and galois awarded darpa contract to formally verify blockchain-based integrity monitoring system. https:\/\/guardtime.com\/blog\/galois-and-guardtime-federal-awarded-1-8m-darpa-contract-to-formallyverify-blockchain-based-inte"},{"key":"9426_CR145","volume-title":"Decentralizing privacy: using blockchain to protect personal data","author":"G Zyskind","year":"2015","unstructured":"Zyskind G, Nathan O, Pentland A S. Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of IEEE Security and Privacy Workshops, San Jose, 2015. 180\u2013184"},{"key":"9426_CR146","volume-title":"Securing user identity and transactions symbiotically: IoT meets blockchain","author":"D W Kravitz","year":"2017","unstructured":"Kravitz D W, Cooper J. Securing user identity and transactions symbiotically: IoT meets blockchain. In: Proceedings of IEEE Global Internet of Things Summit, Geneva, 2017"},{"key":"9426_CR147","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, et al. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Int Things J, 2017, 4: 1832\u20131843","journal-title":"IEEE Int Things J"},{"key":"9426_CR148","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996810","volume-title":"Towards trustworthy and private keyword search in encrypted decentralized storage","author":"C J Cai","year":"2017","unstructured":"Cai C J, Yuan X L, Wang C. Towards trustworthy and private keyword search in encrypted decentralized storage. In: Proceedings of 2017 IEEE International Conference on Conmunications, Paris, 2017"},{"key":"9426_CR149","unstructured":"IBM Institute for Business Value. Device democracy: saving the future of the internet of things. http:\/\/www-935.ibm.com\/services\/us\/gbs\/thoughtleadership\/internetofthings\/"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9426-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9426-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9426-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T09:33:52Z","timestamp":1661592832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9426-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,9]]},"references-count":149,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["9426"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9426-4","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,9]]},"assertion":[{"value":"15 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"081301"}}