M Harvanek, J Bolcek, J Kufa, L Polak… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an …
The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been motivated by the growing …
H Sedjelmaci, K Tourki, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
The security of Sixth Generation (6G) technology and its services have been a focal point for industry, academia, and governments. To safeguard this emerging technology from cyber …
The advancement of cellular communication technology has profoundly transformed human life. People can now watch high-definition videos anytime, anywhere, and aim for the …
F Tong, B Ding, Y Zhang, S He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
It is necessary for rescuers to localize a target trapped in a an unknown area resulting from various natural disasters or human warfare. The global navigation satellite systems and …
Ensuring user privacy remains a critical concern within mobile cellular networks, particularly given the proliferation of interconnected devices and services. In fact, a lot of user privacy …
JH Huang, SM Cheng, R Kaliski… - IEEE INFOCOM 2023 …, 2023 - ieeexplore.ieee.org
In order to support the diverse requirements of 5G communications, a multitude of RAN components are required. To enable multiple vendor support for 5G, each of whom can …
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the most common primitives for mobile attacks that are used in the real world. However, despite …
Identity and access management frameworks address user access rights and data governance for organizations, vendors and users. In response to the problems associated …