Study and investigation on 5G technology: A systematic review

R Dangi, P Lalwani, G Choudhary, I You, G Pau - Sensors, 2021 - mdpi.com
In wireless communication, Fifth Generation (5G) Technology is a recent generation of
mobile networks. In this paper, evaluations in the field of mobile communication technology …

Machine learning for wireless sensor networks security: An overview of challenges and issues

R Ahmad, R Wazirali, T Abu-Ain - Sensors, 2022 - mdpi.com
Energy and security are major challenges in a wireless sensor network, and they work
oppositely. As security complexity increases, battery drain will increase. Due to the limited …

Internet of things based smart grids supported by intelligent edge computing

S Chen, H Wen, J Wu, W Lei, W Hou, W Liu, A Xu… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, an edge computing system for IoT-based (Internet of Things) smart grids is
proposed to overcome the drawbacks in the current cloud computing paradigm in power …

[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey

AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos - Internet of Things, 2022 - Elsevier
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …

[PDF][PDF] A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions

JH Park, S Rathore, SK Singh, MM Salim… - Hum.-Centric Comput …, 2021 - hcisj.com
With the advancement of information and communication technologies, fifth-generation (5G)
has become an emerging communication medium to support higher speed, lower latency …

[HTML][HTML] A comprehensive review on 5G-based smart healthcare network security: taxonomy, issues, solutions and future research directions

A Ahad, Z Ali, A Mateen, M Tahir, A Hannan, NM Garcia… - Array, 2023 - Elsevier
Healthcare is experiencing a fast change from a hospital-centric and specialist-focused
model to one that is dispersed and patient-centric. Numerous technological advancements …

A survey of online data-driven proactive 5G network optimisation using machine learning

B Ma, W Guo, J Zhang - IEEE access, 2020 - ieeexplore.ieee.org
In the fifth-generation (5G) mobile networks, proactive network optimisation plays an
important role in meeting the exponential traffic growth, more stringent service requirements …

Adaptive physical layer authentication using machine learning with antenna diversity

M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …

User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks

S Chen, Z Pang, H Wen, K Yu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, a scheme to detect both clone and Sybil attacks by using channel-based
machine learning is proposed. To identify malicious attacks, channel responses between …