Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey

AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos - Internet of Things, 2022 - Elsevier
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …

A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks

A Boualouache, T Engel - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly
accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G …

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach

VO Nyangaresi - Proceedings of Third International Conference on …, 2023 - Springer
Abstract The 3rd Generation Partnership Project (3GPP) has specified the 5G Authentication
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …

Security analysis of critical 5g interfaces

M Mahyoub, AA AbdulGhaffar, E Alalade… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect
Network Functions (NFs) to exchange data and services. Certain interfaces are particularly …

A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges

A Haghrah, MP Abdollahi, H Azarhava… - EURASIP Journal on …, 2023 - Springer
With the purpose of providing higher data rate and ultra-reliable and low-latency
communications for the users, employing the small cells in the upcoming Fifth-Generation …

Don't hand it over: Vulnerabilities in the handover procedure of cellular telecommunications

E Bitsikas, C Pöpper - Proceedings of the 37th Annual Computer Security …, 2021 - dl.acm.org
Mobility management in the cellular networks plays a significant role in preserving mobile
services with minimal latency while a user is moving. To support this essential functionality …

Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications

G Amponis, P Radoglou-Grammatikis, T Lagkas… - EURASIP Journal on …, 2022 - Springer
The modern communications landscape requires reliable, high-speed, high-throughput and
secure links and sessions between user equipment instances and the data network. The 5G …