Study and investigation on 5G technology: A systematic review

R Dangi, P Lalwani, G Choudhary, I You, G Pau - Sensors, 2021 - mdpi.com
In wireless communication, Fifth Generation (5G) Technology is a recent generation of
mobile networks. In this paper, evaluations in the field of mobile communication technology …

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

Effective feature selection methods to detect IoT DDoS attack in 5G core network

YE Kim, YS Kim, H Kim - Sensors, 2022 - mdpi.com
The 5G networks aim to realize a massive Internet of Things (IoT) environment with low
latency. IoT devices with weak security can cause Tbps-level Distributed Denial of Service …

A comprehensive study on the role of machine learning in 5G security: challenges, technologies, and solutions

HN Fakhouri, S Alawadi, FM Awaysheh, IB Hani… - Electronics, 2023 - mdpi.com
Fifth-generation (5G) mobile networks have already marked their presence globally,
revolutionizing entertainment, business, healthcare, and other domains. While this leap …

Security analysis of critical 5g interfaces

M Mahyoub, AA AbdulGhaffar, E Alalade… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Interfaces play a crucial role in the Fifth Generation (5G) architecture as they interconnect
Network Functions (NFs) to exchange data and services. Certain interfaces are particularly …

A survey on XAI for beyond 5G security: technical aspects, use cases, challenges and research directions

T Senevirathna, VH La, S Marchal, B Siniarski… - arXiv preprint arXiv …, 2022 - arxiv.org
With the advent of 5G commercialization, the need for more reliable, faster, and intelligent
telecommunication systems are envisaged for the next generation beyond 5G (B5G) radio …

Cyber security threats for 5G networks

JP Mohan, N Sugunaraj… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
The fifth-generation mobile network (5G) services have the potential to provide high-speed
connectivity to a large user base with excellent benchmarks on low latencies, large capacity …

Automated generation of 5G fine-grained threat models: A systematic approach

G Daniele, R Massimiliano, M Wissam - IEEE Access, 2023 - ieeexplore.ieee.org
Fifth-generation technology standard for broadband cellular networks, 5G, delivers a
significant increase in data speeds and capacity, as well as new capabilities such as higher …

Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix

Y Shin, K Kim, JJ Lee, K Lee - Security and Communication …, 2022 - Wiley Online Library
In the past, phishing techniques were a common means of attack carried out by individuals
or small groups via spam mail on a randomly selected target. However, in recent years …

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing

Q Zhang, L Zhu, R Wang, J Li, J Yuan… - … Journal of Intelligent …, 2022 - Wiley Online Library
Security communication and information sharing among mobile devices are important
application technologies of the intelligent information system (IIS). Because IIS is vulnerable …