Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

K Ramezanpour, J Jagannath, A Jagannath - Computer Networks, 2023 - Elsevier
Spectrum scarcity has been a major concern for achieving the desired quality of experience
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …

5G security challenges and solutions: a review by OSI layers

S Sullivan, A Brighente, SAP Kumar, M Conti - Ieee Access, 2021 - ieeexplore.ieee.org
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …

Enabling efficient blockage-aware handover in RIS-assisted mmWave cellular networks

L Jiao, P Wang, A Alipour-Fanid… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, networks operate at frequencies over 28 GHz (mmWave) have emerged as a
viable solution for 5G mobile networks to provide Gbps data rate. Due to the high directivity …

Towards spoofing resistant next generation IoT networks

MR Nosouhi, K Sood, M Grobler… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The potential vulnerability to wireless spoofing attacks is still a critical concern for Next
Generation Internet of Things (NGIoT) networks which may result in catastrophic …

Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities

S Zhang, D Zhu, Y Liu - Computer Networks, 2024 - Elsevier
With the commercial deployment of the 5G system, researchers from both academia and
industry are moving attention to the blueprint of the 6G system. The space-air-ground-sea …

Supportive 5G infrastructure policies are essential for universal 6G: Assessment using an open-source techno-economic simulation model utilizing remote sensing

EJ Oughton, A Jha - Ieee Access, 2021 - ieeexplore.ieee.org
Work has now begun on the sixth generation of cellular technologies ('6G ') and cost-efficient
global broadband coverage is already becoming a key pillar. Indeed, we are still far from …

Secrecy energy efficiency maximization for distributed intelligent-reflecting-surface-assisted MISO secure communications

H Song, H Wen, J Tang, PH Ho… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates energy-efficient secure communication design with the help of
multiple phase-adjustable intelligent reflecting surfaces (IRSs). By creating desirable …

Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key generation for multiple IoT devices

J Tang, H Wen, HH Song, L Jiao… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the increasing demands for sharing confidential information among massive Internet of
Things (IoT) devices in 5G and beyond wireless networks, many applications require the …

A novel hybrid physical layer authentication scheme for multiuser wireless communication systems

E Illi, M Qaraqe, F El Bouanani - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Guaranteeing decent secrecy levels in future wireless network generations has gained
crucial importance due to the unprecedented increase in wireless connectivity worldwide. In …

[PDF][PDF] Optimal key handover management for enhancing security in mobile network

V Suma, W Haoxiang - Journal of trends in Computer Science …, 2020 - scholar.archive.org
The 3GPP long term Evolution or System Architecture Evolution (LTE/SAE) was designed for
the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about …