Secure the 5G and beyond networks with zero trust and access control systems for cloud native architectures

HA Kholidy, K Disen, A Karam… - 2023 20th ACS/IEEE …, 2023 - ieeexplore.ieee.org
5G networks are highly distributed, built on an open service-based architecture that requires
multi-vendor hardware and software development environments, all of which create a high …

Machine learning for 6G wireless networks: Carrying forward enhanced bandwidth, massive access, and ultrareliable/low-latency service

J Du, C Jiang, J Wang, Y Ren… - IEEE Vehicular …, 2020 - ieeexplore.ieee.org
To satisfy the expected plethora of demanding services, the future generation of wireless
networks (6G) has been mandated as a revolutionary paradigm to carry forward the …

Overview of 5G security challenges and solutions

I Ahmad, T Kumar, M Liyanage… - IEEE …, 2018 - ieeexplore.ieee.org
5G networks will use novel technological concepts to meet the requirements of broadband
access everywhere, high user and device mobility, and connectivity of massive number of …

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities

S Zhang, D Zhu - Computer Networks, 2020 - Elsevier
Abstract 6G is expected to support the unprecedented Internet of everything scenarios with
extremely diverse and challenging requirements. To fulfill such diverse requirements …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

A systematic analysis of 5G networks with a focus on 5G core security

Q Tang, O Ermis, CD Nguyen, A De Oliveira… - IEEE …, 2022 - ieeexplore.ieee.org
After many years of work, 5G standards are still under development and the corresponding
technical specifications continue to evolve on the fly. At this moment, several countries have …

IoT network security: Threats, risks, and a data-driven defense framework

C Wheelus, X Zhu - IoT, 2020 - mdpi.com
The recent surge in Internet of Things (IoT) deployment has increased the pace of
integration and extended the reach of the Internet from computers, tablets and phones to a …

What physical layer security can do for 6G security

M Mitev, A Chorti, HV Poor… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
While existing security protocols were designed with a focus on the core network, the
enhancement of the security of the B5G access network becomes of critical importance …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

5G security challenges and opportunities: A system approach

A Dutta, E Hammad - 2020 IEEE 3rd 5G world forum (5GWF), 2020 - ieeexplore.ieee.org
The digital transformation brought by 5G is redefining current models of end-to-end
connectivity and service reliability to include security-by-design principles necessary to …