Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey

MR Ahmed, AKMM Islam, S Shatabda, S Islam - IEEE Access, 2022 - ieeexplore.ieee.org
Identity Management System (IDMS) refers to how users or individuals are identified and
authorized to use organizational systems and services. Since traditional identity …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

The road to trustworthy 6G: A survey on trust anchor technologies

B Veith, D Krummacker… - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
While 5G networks are driving a growing number of use cases in the fields of iot and
industrial applications, the vision of the next generation of mobile communications systems …

6G Decentralization

SA Wright - 2022 International Conference on Electrical and …, 2022 - ieeexplore.ieee.org
Decentralization was a key design objective underlying the design of the Internet, with
independent networks collaborating to deliver packet network services. As web services …

Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures

S Bi, X Yuan, S Hu, K Li, W Ni, E Hossain… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of communication technologies marks a transformative phase in critical
infrastructure construction, where the meticulous analysis of failures becomes paramount in …

[PDF][PDF] Blockchain technology integration in service migration to 6g communication networks: A comprehensive review

A Al-Ansi, AM Al-Ansi, A Muthanna… - Indonesian J. Electr …, 2024 - researchgate.net
The next generation of wireless networks, 6G is being designed with data-intensive
applications. One of the key technologies that will enable 6G is blockchain technology. The …

Beyond Certificates: 6G-ready Access Control for the Service-Based Architecture with Decentralized Identifiers and Verifiable Credentials

SR Garzon, HD Tuan, MM Martinez, A Küpper… - arXiv preprint arXiv …, 2023 - arxiv.org
In 6G, mobile networks are poised to transition from monolithic structures owned and
operated by single mobile network operators into multi-stakeholder networks where various …

Secure and Trustful Cross-Domain Communication with Decentralized Identifiers in 5G and Beyond

H Dinh-Tuan, SR Garzon, J Fu - 2024 27th Conference on …, 2024 - ieeexplore.ieee.org
In the evolving landscape of future mobile networks, there is a critical need for secure and
trustful communication modalities to support dynamic interactions among core network …

Quantum-Secure Signalling Model for L1/L2 Next-Gen Interconnect and Roaming Networks Over IPX for NB-IoT Traffic: A Review

T Ngobeni, B Kabaso - International …, 2024 - papers.academic-conferences.org
Signalling security is critical for next-generation mobile (NGN) networks to ensure integrity,
privacy, and confidentiality of communication protocols. However, recent research on …