Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

[HTML][HTML] Survey on 5G Physical Layer Security Threats and Countermeasures

M Harvanek, J Bolcek, J Kufa, L Polak… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
With the expansion of wireless mobile networks into both the daily lives of individuals as well
as into the widely developing market of connected devices, communication is an …

European 5g security in the wild: Reality versus expectations

O Lasierra, G Garcia-Aviles, E Municio… - Proceedings of the 16th …, 2023 - dl.acm.org
5G cellular systems are slowly being deployed worldwide delivering the promised
unprecedented levels of throughput and latency to hundreds of millions of users. At such …

An Attack to One-Tap Authentication Services in Cellular Networks

Z Cui, B Cui, J Fu, BK Bhargava - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The One-Tap Authentication (OTAuth) based on the cellular network is a password-less
login service provided by Mobile Network Operator (MNO) through the unique …

An experimental testbed for 5g network security assessment

K Baccar, A Lahmadi - NOMS 2023-2023 IEEE/IFIP Network …, 2023 - ieeexplore.ieee.org
The Fifth Generation (5G) mobile networks are designed to provide a large range of services
with stringent requirements in robustness and security. Thus, it is important to ensure that …

Attacks against security context in 5g network

Z Cui, B Cui, L Su, H Du, H Wang, J Fu - International Symposium on …, 2022 - Springer
The security context used in 5G authentication is generated during the Authentication and
Key Agreement (AKA) procedure and stored in both the user equipment (UE) and the …

Unmasking 5G Security: Bridging the Gap Between Expectations and Reality

O Lasierra, N Ludant, G Garcia-Aviles, E Municio… - Authorea …, 2024 - techrxiv.org
5G cellular systems are slowly being deployed worldwide delivering the promised
unprecedented levels of throughput and latency to hundreds of millions of users. At such …

Deep learning-based radio frequency identification of false base stations

J Bolcek, J Kufa, M Harvanek, L Polak… - 2023 Workshop on …, 2023 - ieeexplore.ieee.org
Advances in mobile and wireless communications allow to handle the continuously
increasing demands on the data volume and connectivity of users. The 5G Open Radio …

NReplay: 5G Key Reinstallation Attack Based on NAS Layer Vulnerabilities

W Fan, B Shi, C Peng - MILCOM 2024-2024 IEEE Military …, 2024 - ieeexplore.ieee.org
With the rapid development of 5G communication, it has been widely applied by users in
multiple fields. However, this has led to concerns about security and privacy. This paper …

Cybersecurity Implications of 5G Networks: Risks, Challenges, and Recommendations for Secure Deployment

D Fajar - … Journal of Cybersecurity Risk Management, Forensics …, 2024 - hashsci.com
The advent of 5G networks represents a transformative leap in communication technologies,
enabling unprecedented connectivity, faster data transfer rates, lower latency, and support …