D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive study on the security of …
Through direct communication, device-to-device (D2D) technology can increase the overall throughput, enhance the coverage, and reduce the power consumption of cellular …
L Jin, X Hu, Y Lou, Z Zhong, X Sun… - China …, 2021 - ieeexplore.ieee.org
The information security and functional safety are fundamental issues of wireless communications sytems. The endogenous security principle based on Dynamic …
SP Bendale, JR Prasad - 2018 IEEE global conference on …, 2018 - ieeexplore.ieee.org
With the introduction of 5G Mobile Wireless Networks there are many issues regarding security. The comprehensive study of new 5G Mobile Wireless Network in contrast with …
Conventional anti-jamming methods mostly rely on frequency hopping to hide or escape from jammers. These approaches are not efficient in terms of bandwidth usage and can also …
O Ajibuwa, B Hamdaoui, AA Yavuz - arXiv preprint arXiv:2305.05040, 2023 - arxiv.org
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs) have shown great potential in identifying anomalies in the network traffic of networked …
A Bhardwaj - Procedia Computer Science, 2020 - Elsevier
Abstract 5G networks are in advanced stages of trials across the globe and the deployment will begin as early as 2020. In this survey paper, the possible use cases of 5G networks in …
Authentication and integrity are foundational security services for trustworthy systems and the prerequisite of privacy preservation. At the heart of these services lies digital signatures …
Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication …