Machine learning for physical layer in 5G and beyond wireless networks: A survey

J Tanveer, A Haider, R Ali, A Kim - Electronics, 2021 - mdpi.com
Fifth-generation (5G) technology will play a vital role in future wireless networks. The
breakthrough 5G technology will unleash a massive Internet of Everything (IoE), where …

Context-aware security for 6G wireless: The role of physical layer security

A Chorti, AN Barreto, S Köpsell, M Zoli… - IEEE …, 2022 - ieeexplore.ieee.org
Sixth generation systems are expected to face new security challenges, while opening up
new frontiers toward context awareness in the wireless edge. The workhorse behind this …

[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol

J Munilla, M Burmester, R Barco - Computer Networks, 2021 - Elsevier
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …

HashXor: A lightweight scheme for identity privacy of IoT devices in 5G mobile network

H Choudhury - Computer Networks, 2021 - Elsevier
Mobile networks are set to play a crucial role as backbone network in IoT deployments due
to their low cost, broad coverage, high bandwidth, and low latency. However, a challenging …

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

P Scalise, M Boeding, M Hempel, H Sharif… - Future Internet, 2024 - mdpi.com
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …

Measuring the deployment of 5g security enhancement

S Nie, Y Zhang, T Wan, H Duan, S Li - … of the 15th ACM Conference on …, 2022 - dl.acm.org
The fifth-generation (5G) cellular network is entering an era of rapid development. Not only
is 5G supposed to be fast, it also offers enhanced security based on 5G security …

5g-ipaka: An improved primary authentication and key agreement protocol for 5g networks

Y Xiao, Y Wu - Information, 2022 - mdpi.com
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G
AKA (authentication and key agreement) protocol. However, there may still be some …

Provable non-frameability for 5g lawful interception

F Boeira, M Asplund, M Barcellos - … of the 16th ACM Conference on …, 2023 - dl.acm.org
Mobile networks have grown in size and relevance, with novel applications in areas
including transportation, finance, and health. The wide use of mobile networks generates …

5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead

Y Xiao, S Gao - Information, 2022 - mdpi.com
There are still some shortcomings in the latest version of the 5G authentication and key
agreement (AKA) protocol, which is specified by the third-generation partnership project …

Data science around the indexed literature perspective

MKM Nasution, OS Sitompul, EB Nababan… - … in Intelligent Systems …, 2020 - Springer
Conceptually, data science burdened with many other terms that refer to various interests
about data. The terms calls the subject of learning and study as scientific fields that …