{"id":"https://openalex.org/W7140538002","doi":"https://doi.org/10.1109/jsac.2026.3673450","title":"Secure Communications, Sensing, and Computing Toward Next-Generation Networks","display_name":"Secure Communications, Sensing, and Computing Toward Next-Generation Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140538002","doi":"https://doi.org/10.1109/jsac.2026.3673450"},"language":null,"primary_location":{"id":"doi:10.1109/jsac.2026.3673450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3673450","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ruiqi Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]},{"id":"https://openalex.org/I4391767749","display_name":"State Key Laboratory of Mobile Networks and Mobile Multimedia Technology","ror":"https://ror.org/05cd55294","country_code":null,"type":"facility","lineage":["https://openalex.org/I4210098582","https://openalex.org/I4391767749"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruiqi Liu","raw_affiliation_strings":["State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, China","institution_ids":["https://openalex.org/I180662265","https://openalex.org/I4391767749"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Beixiong Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Beixiong Zheng","raw_affiliation_strings":["School of Microelectronics, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Microelectronics, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jemin Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jemin Lee","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Si-Hyeon Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Si-Hyeon Lee","raw_affiliation_strings":["School of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Georges Kaddoum","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["Department of Electrical Engineering, &#x00C9;cole de Technologie Sup&#x00E9;rieure, Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, &#x00C9;cole de Technologie Sup&#x00E9;rieure, Universit&#x00E9; du Qu&#x00E9;bec, Montreal, QC, Canada","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Onur G\u00fcnl\u00fc","orcid":null},"institutions":[{"id":"https://openalex.org/I200332995","display_name":"TU Dortmund University","ror":"https://ror.org/01k97gp34","country_code":"DE","type":"education","lineage":["https://openalex.org/I200332995"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Onur G\u00fcnl\u00fc","raw_affiliation_strings":["Lehrstuhl f&#x00FC;r Nachrichtentechnik, Technische Universit&#x00E4;t Dortmund, Dortmund, Germany"],"affiliations":[{"raw_affiliation_string":"Lehrstuhl f&#x00FC;r Nachrichtentechnik, Technische Universit&#x00E4;t Dortmund, Dortmund, Germany","institution_ids":["https://openalex.org/I200332995"]}]},{"author_position":"last","author":{"id":null,"display_name":"Deniz G\u00fcnd\u00fcz","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Deniz G\u00fcnd\u00fcz","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, Imperial College London, London, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, Imperial College London, London, U.K","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I180662265","https://openalex.org/I4391767749"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79256328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"44","issue":null,"first_page":"4444","last_page":"4470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.22349999845027924,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.22349999845027924,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.09600000083446503,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.03889999911189079,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36640000343322754},{"id":"https://openalex.org/keywords/intelligent-network","display_name":"Intelligent Network","score":0.3443000018596649},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3059000074863434},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.29339998960494995},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.28630000352859497}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8295000195503235},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5989000201225281},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36640000343322754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36239999532699585},{"id":"https://openalex.org/C51675839","wikidata":"https://www.wikidata.org/wiki/Q1665681","display_name":"Intelligent Network","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3059000074863434},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29589998722076416},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2026.3673450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3673450","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2151786554","display_name":null,"funder_award_id":"EP/X030806/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G4162619896","display_name":null,"funder_award_id":"RS-2024-00360387","funder_id":"https://openalex.org/F4320322613","funder_display_name":"Teollisuuden Voima Oyj"},{"id":"https://openalex.org/G4330861540","display_name":null,"funder_award_id":"101139232","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G5427707818","display_name":null,"funder_award_id":"ID24-0087","funder_id":"https://openalex.org/F4320320940","funder_display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning"},{"id":"https://openalex.org/G7547104240","display_name":null,"funder_award_id":"62331022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G759609298","display_name":null,"funder_award_id":"EP/Y028732/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G7963905400","display_name":null,"funder_award_id":"RS-2025-00561467","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G8154999967","display_name":null,"funder_award_id":"62571193","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320314731","display_name":"UK Research and Innovation","ror":"https://ror.org/001aqnf71"},{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320322613","display_name":"Teollisuuden Voima Oyj","ror":"https://ror.org/00qsw2f44"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Next-generation":[0],"wireless":[1,111,232],"networks":[2],"are":[3],"progressing":[4],"beyond":[5],"conventional":[6],"connectivity":[7],"to":[8,19,221],"incorporate":[9],"emerging":[10],"sensing":[11,142,159],"and":[12,34,57,73,92,102,122,127,132,135,147,158,161,194],"computing":[13,180,204],"capabilities.":[14],"This":[15,94],"convergence":[16],"gives":[17],"rise":[18],"integrated":[20,110,222],"systems":[21],"that":[22,37,206],"enable":[23],"not":[24],"only":[25],"uninterrupted":[26],"communication,":[27],"but":[28],"also":[29],"environmental":[30],"awareness,":[31],"intelligent":[32],"decision-making,":[33],"novel":[35],"applications":[36,85,174],"take":[38],"advantage":[39],"of":[40,66,81,100,130,153,172,197,211],"these":[41,173,212],"combined":[42],"features.":[43],"At":[44],"the":[45,63,67,75,125,151,176,182],"same":[46],"time,":[47],"this":[48],"integration":[49],"brings":[50],"substantial":[51],"security":[52,91,101,117,126,146,218],"challenges.":[53,213],"As":[54],"computing,":[55],"sensing,":[56],"communication":[58,120],"become":[59],"more":[60],"tightly":[61],"intertwined,":[62],"overall":[64],"complexity":[65],"system":[68],"increases,":[69],"creating":[70],"new":[71],"vulnerabilities":[72],"expanding":[74],"attack":[76],"surface.":[77],"The":[78,168],"widespread":[79],"deployment":[80],"data-heavy":[82],"artificial":[83],"intelligence":[84],"further":[86],"amplifies":[87],"concerns":[88],"regarding":[89],"data":[90,190],"privacy.":[93],"paper":[95],"presents":[96],"a":[97],"comprehensive":[98],"survey":[99],"privacy":[103,128,148],"threats,":[104],"along":[105],"with":[106],"potential":[107],"countermeasures,":[108],"in":[109],"systems.":[112,233],"We":[113,199],"first":[114],"review":[115],"physical-layer":[116],"techniques":[118],"for":[119,166,178],"networks,":[121],"then":[123],"investigate":[124],"implications":[129],"semantic":[131],"pragmatic":[133],"communications":[134],"their":[136],"associated":[137],"cross-layer":[138],"design":[139],"methodologies.":[140],"For":[141],"functionalities,":[143],"we":[144,215],"pinpoint":[145],"risks":[149,187],"at":[150],"levels":[152],"signal":[154],"sources,":[155],"propagation":[156],"channels,":[157],"targets,":[160],"summarize":[162],"state-of-the-art":[163],"defense":[164],"strategies":[165],"each.":[167],"growing":[169],"computational":[170],"requirements":[171],"drive":[175],"need":[177],"distributed":[179],"over":[181],"network,":[183],"which":[184],"introduces":[185],"additional":[186],"such":[188],"as":[189],"leakage,":[191],"weak":[192],"authentication,":[193],"multiple":[195],"points":[196],"failure.":[198],"subsequently":[200],"discuss":[201],"secure":[202],"coded":[203],"approaches":[205],"can":[207],"help":[208],"overcome":[209],"several":[210],"Finally,":[214],"introduce":[216],"unified":[217],"frameworks":[219],"tailored":[220],"communication\u2013sensing\u2013computing":[223],"architectures,":[224],"offering":[225],"an":[226],"end-to-end":[227],"perspective":[228],"on":[229],"protecting":[230],"future":[231]},"counts_by_year":[],"updated_date":"2026-04-09T06:08:40.794217","created_date":"2026-03-01T00:00:00"}
