The internet of modular robotic things: Issues, limitations, challenges, & solutions

JPA Yaacoub, HN Noura, B Piranda - Internet of Things, 2023 - Elsevier
The world is becoming more digitized with the rise of modular robotic systems. Therefore,
with the increasing demands and needs for robotics, the modular robotic domain was …

[HTML][HTML] Survey on 5G Physical Layer Security Threats and Countermeasures

M Harvanek, J Bolcek, J Kufa, L Polak… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
With the expansion of wireless mobile networks into both the daily lives of individuals as well
as into the widely developing market of connected devices, communication is an …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Enabling 6G security: The synergy of zero trust architecture and artificial intelligence

H Sedjelmaci, K Tourki, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
The security of Sixth Generation (6G) technology and its services have been a focal point for
industry, academia, and governments. To safeguard this emerging technology from cyber …

SMDFbs: Specification-Based Misbehavior Detection for False Base Stations

H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You - Sensors, 2023 - mdpi.com
The advancement of cellular communication technology has profoundly transformed human
life. People can now watch high-definition videos anytime, anywhere, and aim for the …

A single-anchor mobile localization scheme

F Tong, B Ding, Y Zhang, S He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
It is necessary for rescuers to localize a target trapped in a an unknown area resulting from
various natural disasters or human warfare. The global navigation satellite systems and …

SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks

S Eleftherakis, D Giustiniano, N Kourtellis - arXiv preprint arXiv …, 2024 - arxiv.org
Ensuring user privacy remains a critical concern within mobile cellular networks, particularly
given the proliferation of interconnected devices and services. In fact, a lot of user privacy …

Developing xApps for rogue base station detection in SDR-enabled O-RAN

JH Huang, SM Cheng, R Kaliski… - IEEE INFOCOM 2023 …, 2023 - ieeexplore.ieee.org
In order to support the diverse requirements of 5G communications, a multitude of RAN
components are required. To enable multiple vendor support for 5G, each of whom can …

The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections

T Heijligenberg, D Rupprecht, K Kohls - Proceedings of the 17th Cyber …, 2024 - dl.acm.org
Fake base stations are a well-known threat to pre-5G mobile networks and are one of the
most common primitives for mobile attacks that are used in the real world. However, despite …

Blockchain-based self-sovereign identity solution for aerial base station integrated networks

E Zeydan, J Mangues-Bafalluy, S Arslan… - Vehicular …, 2024 - Elsevier
Identity and access management frameworks address user access rights and data
governance for organizations, vendors and users. In response to the problems associated …