Smart jamming attacks in 5G new radio: A review

Y Arjoune, S Faruque - 2020 10th annual computing and …, 2020 - ieeexplore.ieee.org
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

Introduction to wireless endogenous security and safety: Problems, attributes, structures and functions

L Jin, X Hu, Y Lou, Z Zhong, X Sun… - China …, 2021 - ieeexplore.ieee.org
The information security and functional safety are fundamental issues of wireless
communications sytems. The endogenous security principle based on Dynamic …

Security threats and challenges in future mobile wireless networks

SP Bendale, JR Prasad - 2018 IEEE global conference on …, 2018 - ieeexplore.ieee.org
With the introduction of 5G Mobile Wireless Networks there are many issues regarding
security. The comprehensive study of new 5G Mobile Wireless Network in contrast with …

Reinforcement learning for deceiving reactive jammers in wireless networks

A Pourranjbar, G Kaddoum… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Conventional anti-jamming methods mostly rely on frequency hopping to hide or escape
from jammers. These approaches are not efficient in terms of bandwidth usage and can also …

A survey on ai/ml-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities

O Ajibuwa, B Hamdaoui, AA Yavuz - arXiv preprint arXiv:2305.05040, 2023 - arxiv.org
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in the network traffic of networked …

5G for military communications

A Bhardwaj - Procedia Computer Science, 2020 - Elsevier
Abstract 5G networks are in advanced stages of trials across the globe and the deployment
will begin as early as 2020. In this survey paper, the possible use cases of 5G networks in …

Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures

AA Yavuz, K Sedghighadikolaei… - 2023 5th IEEE …, 2023 - ieeexplore.ieee.org
Authentication and integrity are foundational security services for trustworthy systems and
the prerequisite of privacy preservation. At the heart of these services lies digital signatures …

[图书][B] Security in Wireless Communication Networks

Y Qian, F Ye, HH Chen - 2021 - books.google.com
Receive comprehensive instruction on the fundamentals of wireless security from three
leading international voices in the field Security in Wireless Communication …