Reinforcement learning-based slice isolation against ddos attacks in beyond 5g networks

A Javadpour, F Ja'fari, T Taleb… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Network slicing in 5G networks can be modeled as a Virtual Network Embedding (VNE)
problem, wherein the slice requests must be efficiently mapped on the core network. This …

Real-time data measurement methodology to evaluate the 5G network performance indicators

RG Lazar, AV Militaru, CF Caruntu, C Pascal… - IEEE …, 2023 - ieeexplore.ieee.org
The 5G technology offers a higher complexity than earlier generations, introducing a new
type of network designed to connect virtually everyone and everything together, including …

[HTML][HTML] Towards a quantum-safe 5G: Quantum Key Distribution in core networks

A Atutxa, A Sanz, J Sasiain, J Astorga… - Computer Communications, 2024 - Elsevier
Abstract The Service-Based Architecture (SBA) of the fifth generation (5G) of cellular
networks introduced great advancements in flexibility, efficiency, and performance of …

Lightweight and secure authentication model for vehicle to everything (v2x) communication based on 5g networks

M Houmer, S Laqtib, S Eddamiri - Journal of Mobile …, 2022 - journals.riverpublishers.com
Integrating the cellular network infrastructure into Intelligent Transport Systems (ITS)
received attention from the research community and standards groups. This technology …

5g communication and security in connected vehicles

A Imbruglia, D Cancila, M Settembre - ACM SIGAda Ada Letters, 2023 - dl.acm.org
The widespread diffusion of Cyber-Physical Systems and their capability to interact with the
physical world depend also on the availability of 5G network. The exponential development …

Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey

Á Sobrinho, M Vilarim, A Barbosa, EC Gurjão… - 2023 - preprints.org
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication
systems and previous generations is crucial. These systems must prioritize maintaining the …

[PDF][PDF] A Systematic Literature Mapping on the Security of 5G and Vertical Applications

Á Sobrinho, MVP dos Santos, AB Silva, DFS Santos… - 2023 - researchgate.net
The deployment of 5G infrastructure is one of the main vectors for new application scenarios
since it enables enhanced data bandwidth, low latency, and comprehensive signal …