A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

5G business models for mobile network operators—A survey

L Banda, M Mzyece, F Mekuria - Ieee Access, 2022 - ieeexplore.ieee.org
Emerging Fifth-generation (5G) mobile networks and associated technologies are expected
to provide multi-service wireless applications with diverse specifications intended to address …

5G: A new future for Mobile Network Operators, or not?

W Lehr, F Queder, J Haucap - Telecommunications Policy, 2021 - Elsevier
The transition to 5G has the potential to significantly disrupt the competitive landscape for
wireless services. For Mobile Network Operators (MNOs), 5G represents the next generation …

Value creation and capture from technology innovation in the 6G era

SS Yrjölä, P Ahokangas, M Matinmikko-Blue - Ieee Access, 2022 - ieeexplore.ieee.org
In the sixth generation of mobile communication networks (6G) era, in which the
convergence of wireless and Internet technologies will drive the digital economy and …

Business models for local 5G micro operators

P Ahokangas, M Matinmikko-Blue… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
5G will change the mobile communication business ecosystem by introducing location
specific high-quality wireless networks that can be operated by different stakeholders. This …

On regulations for 5G: Micro licensing for locally operated networks

M Matinmikko, M Latva-aho, P Ahokangas… - Telecommunications …, 2018 - Elsevier
Future 5G networks aim at providing new high-quality wireless services to meet stringent
and case-specific needs of various vertical sectors beyond traditional mobile broadband …

Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks

A Braeken, M Liyanage, P Kumar, J Murphy - Ieee Access, 2019 - ieeexplore.ieee.org
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …

Sustainability as a challenge and driver for novel ecosystemic 6G business scenarios

S Yrjölä, P Ahokangas, M Matinmikko-Blue - Sustainability, 2020 - mdpi.com
Climate change, the deterioration of the environment and exceeding Earth's carrying
capacity are major threats in operating environment which require new actions in …

White paper on business of 6G

S Yrjola, P Ahokangas, M Matinmikko-Blue… - arXiv preprint arXiv …, 2020 - arxiv.org
Developing products, services and vertical applications for the future digitized society in the
6G era requires a multidisciplinary approach and a re-definition of how we create, deliver …

Quantum key distribution for 5g networks: A review, state of art and future directions

MH Adnan, Z Ahmad Zukarnain, NZ Harun - Future Internet, 2022 - mdpi.com
In recent years, 5G networks and services become progressively popular among
telecommunication providers. Simultaneously, the growth in the usage and deployment of …