BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20210314T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20211107T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20210908T164741Z
UID:81B406C1-3EAF-4BEC-9838-647013C77465
DTSTART;TZID=America/New_York:20210726T120000
DTEND;TZID=America/New_York:20210726T133000
DESCRIPTION:Dr Arslan has graciously offered to continue the discussion on 
 5G technologies.\n\nThe topic is Flexible Radio Access Beyond 5G: A Future
  Projection.\n\nAbstract:\n\nToday&#39;s wireless services and systems have co
 me a long way since the rollout of the conventional voice-centric cellular
  systems. The demand for wireless access in voice and multi-media applicat
 ions has increased tremendously. The trend on the variety and the number o
 f mobile devices along with the mobile applications will certainly continu
 e beyond 5G\, creating a wide range of technical challenges. One of the bi
 ggest challenges is the security of the communication beyond the classical
  crypto based approaches which secure the information. In this talk\, secu
 rity aspects of the physical communication and also physical signal which 
 is called Physical Layer Security (PHY Security) will be discussed. Latest
  trends\, threats\, and techniques to improve the security of the physical
  signal will be discussed. The tentative outline of the talk will be as fo
 llows:\n\n- Wireless Communication trends\, requirements\n- Importance of 
 secure communication\n- Classification of communication security\n- PHY se
 curity: Communication and REM\n- PHY security: Eavesdropping\, Spoofing &amp; 
 Jamming\n- Anti-jamming capable communication\n- Cross-layer security\n- S
 ecure communication &amp; other advanced radio access technologies\n\nCase- st
 udies:\na- Security in URLLC (URLL &amp; Secure communication)\nb- Security in
  vehicular network (V2V and V2I)\nc- Security in NOMA\nd- Security in LIS\
 n\nSpeaker(s): Dr. Arslan Arslan\, \n\nAtlanta\, Georgia\, United States\,
  Virtual: https://events.vtools.ieee.org/m/277084
LOCATION:Atlanta\, Georgia\, United States\, Virtual: https://events.vtools
 .ieee.org/m/277084
ORGANIZER:bpage1@ieee.org
SEQUENCE:6
SUMMARY:Flexible Radio Access Beyond 5G: A Future Projection
URL;VALUE=URI:https://events.vtools.ieee.org/m/277084
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Dr Arslan&amp;nbsp\; has graciously&amp;nbsp\;offe
 red to continue the discussion on 5G technologies.&amp;nbsp\;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;T
 he topic is Flexible Radio Access Beyond 5G: A Future Projection.&lt;/p&gt;\n&lt;p&gt;
 &lt;strong&gt;Abstract:&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;Today&#39;s wireless services and systems h
 ave come a long way since the rollout of the conventional voice-centric ce
 llular systems.&amp;nbsp\; The demand for wireless access in voice and multi-m
 edia applications has increased tremendously. The trend on the variety and
  the number of mobile devices along with the mobile applications will cert
 ainly continue beyond 5G\, creating a wide range of technical challenges. 
 One of the biggest challenges is the &lt;strong&gt;security&lt;/strong&gt; of the comm
 unication beyond the classical crypto based approaches which secure the in
 formation. In this talk\, security aspects of the physical communication a
 nd also physical signal which is called Physical Layer Security (PHY Secur
 ity) will be discussed. Latest trends\, threats\, and techniques to improv
 e the security of the physical signal will be discussed. The tentative out
 line of the talk will be as follows:&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;Wirele
 ss Communication trends\, requirements&lt;/li&gt;\n&lt;li&gt;Importance of secure comm
 unication&lt;/li&gt;\n&lt;li&gt;Classification of communication security&lt;/li&gt;\n&lt;li&gt;PHY
  security: Communication and REM&lt;/li&gt;\n&lt;li&gt;PHY security: Eavesdropping\, S
 poofing &amp;amp\; Jamming&lt;/li&gt;\n&lt;li&gt;Anti-jamming capable communication&lt;/li&gt;\n
 &lt;li&gt;Cross-layer security&lt;/li&gt;\n&lt;li&gt;Secure communication &amp;amp\; other advan
 ced radio access technologies&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p&gt;Case- studies:&lt;br /&gt;a- Secur
 ity in URLLC (URLL &amp;amp\; Secure communication)&lt;br /&gt;b- Security in vehicu
 lar network (V2V and V2I)&lt;br /&gt;c- Security in NOMA&lt;br /&gt;d- Security in LIS
 &lt;/p&gt;
END:VEVENT
END:VCALENDAR

