[HTML][HTML] Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks

P Benlloch-Caballero, Q Wang, JMA Calero - Computer Networks, 2023 - Elsevier
Abstract Internet of Things (IoT) is a major application area of the Fifth-Generation (5G) and
beyond capable of providing massive machine-type communications (mMTC) at a large …

A secure and resilient 6G architecture vision of the German flagship project 6G-ANNA

M Hoffmann, G Kunzmann, T Dudda, R Irmer… - IEEE …, 2023 - ieeexplore.ieee.org
The 6th generation of wireless mobile networks is emerging as a paradigm shifting
successor to unifying the experience across the physical, digital, and human worlds …

Cloud-native 5g infrastructure and network applications (netapps) for public protection and disaster relief: The 5g-epicentre project

KC Apostolakis, G Margetis… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
5G will lay the foundations for the mainstream broadband wireless technology of the next
decade, a leverage toward ensuring the efficiency, effectiveness and adaptability of …

The road beyond 5G: A vision and insight of the key technologies

K Samdanis, T Taleb - IEEE Network, 2020 - ieeexplore.ieee.org
As 5G enters a stable phase in terms of system architecture, 3GPP Release 17 starts to
investigate advanced features that would shape the evolution toward 6G. This paper …

Artificial Intelligence and Machine Learning in 5G Network Security: Opportunities, advantages, and future research trends

N Haider, MZ Baig, M Imran - arXiv preprint arXiv:2007.04490, 2020 - arxiv.org
Recent technological and architectural advancements in 5G networks have proven their
worth as the deployment has started over the world. Key performance elevating factor from …

Security in 5G and beyond recent advances and future challenges

F Salahdine, T Han, N Zhang - Security and Privacy, 2023 - Wiley Online Library
Abstract 5G, 6G, and beyond (xG) technologies aim at delivering emerging services with
new requirements and challenges, enabling full and hyper mobile connectivity over the …

[HTML][HTML] Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G

O Hireche, C Benzaïd, T Taleb - Computer Networks, 2022 - Elsevier
Along with the high demand for network connectivity from both end-users and service
providers, networks have become highly complex; and so has become their lifecycle …

6G wireless communication assisted security management using cloud edge computing

MM Kamruzzaman - Expert Systems, 2023 - Wiley Online Library
Security management is the process of identifying a company's assets (such as people,
buildings, equipment, systems, and information assets) and then developing, documenting …

Privacy-aware blockchain innovation for 6G: Challenges and opportunities

T Nguyen, N Tran, L Loven, J Partala… - 2020 2nd 6G …, 2020 - ieeexplore.ieee.org
6G wireless networks improve on 5G by further increasing reliability, speeding up the
networks and increasing the available bandwidth. These evolutionary enhancements …

Blockchain and 6G-enabled IoT

HH Pajooh, S Demidenko, S Aslam, M Harris - Inventions, 2022 - mdpi.com
Ubiquitous computing turns into a reality with the emergence of the Internet of Things (IoT)
adopted to connect massive numbers of smart and autonomous devices for various …