Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

NOMA and future 5G & B5G wireless networks: A paradigm

U Ghafoor, M Ali, HZ Khan, AM Siddiqui… - Journal of Network and …, 2022 - Elsevier
For the last few decades, wireless communication has been facing a technological
revolution. High data rate and continuous connectivity are the necessities because the …

Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems

P Vargas, I Tien - International Journal of Critical Infrastructure Protection, 2023 - Elsevier
Abstract 5 G technology promises a wide range of benefits for critical infrastructure (CI),
including improved reliability, increased efficiency, cost savings, and increased worker …

A comprehensive study on the role of machine learning in 5G security: challenges, technologies, and solutions

HN Fakhouri, S Alawadi, FM Awaysheh, IB Hani… - Electronics, 2023 - mdpi.com
Fifth-generation (5G) mobile networks have already marked their presence globally,
revolutionizing entertainment, business, healthcare, and other domains. While this leap …

Physical layer security for NOMA systems: Requirements, issues, and recommendations

S Pakravan, JY Chouinard, X Li, M Zeng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) has been viewed as a potential candidate for the
upcoming generation of wireless communication systems. Comparing to traditional …

Design of a security and trust framework for 5G multi-domain scenarios

JM Jorquera Valero, PM Sánchez Sánchez… - Journal of Network and …, 2022 - Springer
With the expansion of 5G networks, new business models are arising where multi-tenancy
and active infrastructure sharing will be key enablers for them. With these new opportunities …

Ultra-reliable low-latency slicing in space-air-ground multi-access edge computing networks for next-generation internet of things and mobile applications

A Asheralieva, D Niyato, X Wei - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
We study the problem of ultrareliable and low-latency slicing in multiaccess edge computing
(MEC) systems for the next-generation Internet of Things (IoT) and mobile applications …

A survey on jamming techniques in physical layer security and anti-jamming strategies for 6G

KN Vaishnavi, SD Khorvi, R Kishore… - 2021 28th …, 2021 - ieeexplore.ieee.org
In this paper, we present a comprehensive survey on jamming techniques for physical layer
security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the …

A Modified Hybrid Method Based on PSO, GA, and K‐Means for Network Anomaly Detection

Y Yuan, Y Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
Data anomaly detection plays a vital role in protecting network security and developing
network technology. Aiming at the detection problems of large data volume, complex …

A Verifiable Steganography‐Based Secret Image Sharing Scheme in 5G Networks

S Qin, Z Tan, F Zhou, J Xu… - Security and …, 2021 - Wiley Online Library
With the development and innovation of new techniques for 5G, 5G networks can provide
extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia …