5G security challenges and solutions: a review by OSI layers

S Sullivan, A Brighente, SAP Kumar, M Conti - Ieee Access, 2021 - ieeexplore.ieee.org
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …

Towards spoofing resistant next generation IoT networks

MR Nosouhi, K Sood, M Grobler… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The potential vulnerability to wireless spoofing attacks is still a critical concern for Next
Generation Internet of Things (NGIoT) networks which may result in catastrophic …

EES-WCA: energy efficient and secure weighted clustering for WSN using machine learning approach

P Gulganwa, S Jain - International Journal of Information Technology, 2022 - Springer
Abstract The Wireless Sensor Network (WSN) is an application-centric network, where the
data is collected using sensor nodes and communicated to the server or base station to …

A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework

M Revathi, VV Ramalingam, B Amutha - Wireless Personal …, 2022 - Springer
Recently, SDN has arisen as a new network platform that offers unparalleled programming
that enables network operators to dynamically customize and control their networks. The …

Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks

RS Krishnan, EG Julie, YH Robinson, R Kumar… - Wireless …, 2020 - Springer
Abstract Mobile Ad hoc Networks (MANETs) have gained great interests owing to their
dynamic and smoothness of exploitation. Conversely, the wireless and energetic nature …

Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier

G Subburayalu, H Duraivelu… - Journal of Applied …, 2023 - Taylor & Francis
Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital
for achieving high speed data rate. The degradation occurs due to identification of malicious …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

A decision support system for assessing the role of the 5G network and AI in situational teaching research in higher education

X Liu, M Faisal, A Alharbi - Soft Computing, 2022 - Springer
With the advancement of technological society, human-like a machine and intelligent
systems are used to overcome diverse issues of daily life. Artificial intelligence (AI) role is …

TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications

F Alqahtani, Z Al-Makhadmeh, A Tolba… - Computer Communications, 2020 - Elsevier
Securing communications and information sharing within the Internet of Things (IoT)
paradigm is challenging because of the increase in the size and mobility of the user …

Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud

SA Alghamdi - International Journal of Information Security, 2022 - Springer
Abstract 5G-based mobile ad hoc networks with cloud are a new paradigm that combines
several real-world applications. Routing and security are current issues in MANETs. Security …