Zero touch management: A survey of network automation solutions for 5G and 6G networks

E Coronado, R Behravesh… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Mobile networks are facing an unprecedented demand for high-speed connectivity
originating from novel mobile applications and services and, in general, from the adoption …

AI and 6G security: Opportunities and challenges

Y Siriwardhana, P Porambage… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
While 5G is well-known for network cloudification with micro-service based architecture, the
next generation networks or the 6G era is closely coupled with intelligent network …

A survey of decentralizing applications via blockchain: The 5G and beyond perspective

K Yue, Y Zhang, Y Chen, Y Li, L Zhao… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Trusted third parties (TTPs) are frequently used for serving as an authority to issue and verify
transactions in applications. Although the TTP-based paradigm provides customers with …

[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Blockchain and AI technology convergence: Applications in transportation systems

P Singh, Z Elmi, Y Lau, M Borowska-Stefańska… - Vehicular …, 2022 - Elsevier
The blockchain and artificial intelligence (AI) have been the focal point of innovations and
received increasing attention of the community over the last years. The blockchain …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

Deep learning-aided 6G wireless networks: A comprehensive survey of revolutionary PHY architectures

B Ozpoyraz, AT Dogukan, Y Gevez… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
Deep learning (DL) has proven its unprecedented success in diverse fields such as
computer vision, natural language processing, and speech recognition by its strong …

A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

Trust in 5G and beyond networks

C Benzaïd, T Taleb, MZ Farooqi - IEEE Network, 2021 - ieeexplore.ieee.org
5G and beyond ecosystems will be characterized by a growing set of stakeholders and an
increasing number of interconnected devices and services, not necessarily under the …