Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Toward smart and secure V2X communication in 5G and beyond: A UAV-enabled aerial intelligent reflecting surface solution

Y Cao, S Xu, J Liu, N Kato - IEEE Vehicular Technology …, 2022 - ieeexplore.ieee.org
Vehicle-to-everything (V2X) communication in 5G and beyond provides technical support for
the future intelligent transportation system by enabling vehicles to connect everything in a …

Cell-free massive MIMO networks: Optimal power control against active eavesdropping

TM Hoang, HQ Ngo, TQ Duong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper studies the security aspect of a recently introduced “cell-free massive MIMO”
network under a pilot spoofing attack. First, a simple method to recognize the presence of …

[HTML][HTML] Mitigating 5G security challenges for next-gen industry using quantum computing

C Mangla, S Rani, NMF Qureshi, A Singh - Journal of King Saud University …, 2023 - Elsevier
Abstract 5G has been launched in a few countries of the world, so now all focus shifted
towards the development of future 6G networks. 5G has connected all aspects of society …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on
its various mobile IoT devices and services provided. However, with the explosively …

A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain

M Shafi, RK Jha, M Sabraj - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract 5G NR (New Radio) incorporates concepts of novel technologies such as spectrum
sharing, D2D communication, UDN, and massive MIMO. However, providing security and …

Secure RIS-aided MISO-NOMA system design in the presence of active eavesdropping

L Chai, L Bai, T Bai, J Shi… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
As for the time-division communications system, the pilot spoofing attack (PSA) technique is
maliciously utilized by active eavesdroppers during the uplink training phase, for …

Pilot spoofing attack detection and countermeasure

JK Tugnait - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
In a time-division duplex multiple antenna system, the channel state information can be
estimated using reverse training. A pilot spoofing (contamination) attack occurs when during …

Intelligent reflecting surface aided pilot contamination attack and its countermeasure

KW Huang, HM Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Pilot contamination attack (PCA) in a time division duplex wireless communication system is
considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in …