Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

Bio-inspired network security for 5G-enabled IoT applications

K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …

Access control policy enforcement for zero-trust-networking

R Vanickis, P Jacob… - 2018 29th Irish Signals …, 2018 - ieeexplore.ieee.org
The evolution of the enterprise computing landscape towards emerging trends such as
fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

Artificial intelligence in open-radio access network

PH Masur, JH Reed, NK Tripathi - IEEE Aerospace and …, 2022 - ieeexplore.ieee.org
This article outlines the proposed open-radio access network (O-RAN) deployment for fifth-
generation (5G) wireless networks. O-RAN seeks to supplant hardware-specific radio …

[PDF][PDF] A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions

JH Park, S Rathore, SK Singh, MM Salim… - Hum.-Centric Comput …, 2021 - hcisj.com
With the advancement of information and communication technologies, fifth-generation (5G)
has become an emerging communication medium to support higher speed, lower latency …

Enabling machine learning with service function chaining for security enhancement at 5G edges

B Feng, H Zhou, G Li, Y Zhang, K Sood, S Yu - IEEE Network, 2021 - ieeexplore.ieee.org
With massive sorts of terminals, devices, and machines connecting to 5G, a tremendous
surge of data makes cyber-security a pressing issue, and conventional countermeasures are …

Evolution toward 6G multi-band wireless networks: A resource management perspective

M Rasti, SK Taskou, H Tabassum… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In this article, we first present the vision, key performance indicators, key enabling
techniques (KETs), and services of 6G wireless networks. Then, we highlight a series of …

5G NB‐IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

P Salva-Garcia, JM Alcaraz-Calero… - Security and …, 2018 - Wiley Online Library
Internet of Things (IoT) is a key business driver for the upcoming fifth‐generation (5G) mobile
networks, which in turn will enable numerous innovative IoT applications such as smart city …