{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:23:20Z","timestamp":1776680600304,"version":"3.51.2"},"reference-count":91,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108955","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:03:11Z","timestamp":1591376591000},"page":"122-129","source":"Crossref","is-referenced-by-count":14,"title":["Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey"],"prefix":"10.1109","author":[{"given":"Jos\u00e9 David","family":"Vega S\u00e1nchez","sequence":"first","affiliation":[{"name":"Telecomunicaciones y Redes Escuela Polit&#x00E9;cnica Nacional,Dept. Electr&#x00F3;nica,Quito,Ecuador"}]},{"given":"Luis","family":"Urquiza-Aguiar","sequence":"additional","affiliation":[{"name":"Telecomunicaciones y Redes Escuela Polit&#x00E9;cnica Nacional,Dept. Electr&#x00F3;nica,Quito,Ecuador"}]},{"given":"Martha Cecilia","family":"Paredes Paredes","sequence":"additional","affiliation":[{"name":"Telecomunicaciones y Redes Escuela Polit&#x00E9;cnica Nacional,Dept. Electr&#x00F3;nica,Quito,Ecuador"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2776944"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403556"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2800747"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902144"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2773633"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5876497"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700383"},{"key":"ref39","first-page":"1","article-title":"Network Coding in Cognitive Radio Networks: A Comprehensive Survey","author":"naeem","year":"2018","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2815021"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2770097"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2800005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61863-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159491"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2872884"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2747554"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2682245"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2593445"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2901825"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538740"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824259"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422338"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2879114"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925492"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2760255"},{"key":"ref65","author":"rappaport","year":"2015","journal-title":"Millimeter Wave Wireless Communications"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1575-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800035"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260813"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2832839"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2017.2774707"},{"key":"ref20","article-title":"Artificial-Noise-Aided Secure Communication with Full-Duplex Active Eavesdropper","author":"liu","year":"2018","journal-title":"Proc of IEEE International symposium on Personal Indoor and Mobile Radio Communications (PIMRC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705618"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2833848"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2853101"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2018.8447723"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2867865"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854729"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2827785"},{"key":"ref91","first-page":"1","article-title":"Secure Beamforming in Full-Duplex SWIPT Systems with Loopback Self-Interference Cancellation","author":"dong","year":"2017","journal-title":"2018 IEEE International Conference on Communications (ICC)"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2794739"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2859329"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020712.111298"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876750"},{"key":"ref56","first-page":"1","article-title":"Security Analysis for Massive MIMO System Internal Eavesdroppers","author":"wei","year":"2015","journal-title":"Proc IEEE Veh Tech Conf (VTC2015)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422836"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2659724"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825140"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873614"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2860020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2842126"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854222"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853700"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2876915"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2800747"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2018.8488329"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902144"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2859954"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842826"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2811495"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2725989"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2801790"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4962-0"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2877610"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828598"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref3","first-page":"121","article-title":"Cryptography and Network Security: Principles and Practice","volume":"46","author":"stallings","year":"2008","journal-title":"Int Ann Criminol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2834301"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844558"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref49","author":"al-dulaimi","year":"2018","journal-title":"5G Networks Fundamental Requirements Enabling Technologies and Operations Management"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906845"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2811495"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2837859"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.101812.120660"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2504580"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335124"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2337308"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417660"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2828420"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2426171"},{"key":"ref43","first-page":"1","article-title":"A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security","author":"jameel","year":"2018","journal-title":"IEEE Commun Surveys Tuts"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","location":"Quito, Ecuador","start":{"date-parts":[[2019,10,23]]},"end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108955.pdf?arnumber=9108955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:40:14Z","timestamp":1755715214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108955","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}