A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions

C De Alwis, P Porambage, K Dev… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The dawn of softwarized networks enables Network Slicing (NS) as an important technology
towards allocating end-to-end logical networks to facilitate diverse requirements of emerging …

5G In the internet of things era: An overview on security and privacy challenges

S Sicari, A Rizzardi, A Coen-Porisini - Computer Networks, 2020 - Elsevier
Now reaching 2020, the world is witnessing the initial diffusion of 5G networks, which
promise to revolutionize the mobile wireless communications, providing faster services, very …

Anomaly detection using deep neural network for IoT architecture

Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan… - Applied Sciences, 2021 - mdpi.com
The revolutionary idea of the internet of things (IoT) architecture has gained enormous
popularity over the last decade, resulting in an exponential growth in the IoT networks …

[HTML][HTML] Terminal independent security token derivation scheme for ultra-dense IoT networks

VO Nyangaresi - Array, 2022 - Elsevier
Abstract The Fifth Generation (5G) networks deploy base station ultra-densification to boost
data rates, capacities, reliability, energy efficiency as well as the reduction of communication …

A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

5G network slicing with QKD and quantum-safe security

P Wright, C White, RC Parker, JS Pegon… - Journal of Optical …, 2021 - opg.optica.org
We demonstrate how the 5G network slicing model can be enhanced to address data
security requirements. In this work, we demonstrate two different slice configurations, with …

[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.

RM Saqib, AS Khan, Y Javed, S Ahmad… - … Automation & Soft …, 2022 - academia.edu
This study presents the current state of research on multi-factor authentication.
Authentication is one of the important traits in the security domain as it ensures that …

[PDF][PDF] 5G Network: Techniques to Increase Quality of Service and Quality of Experience

NA Khan - Int. J. Comput. Netw. Appl.(IJCNA), 2022 - academia.edu
The rapid growth of interconnected networks and devices inevitably causes the rise of traffic
demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and …

Secure algorithm for IoT devices authentication

VO Nyangaresi, AJ Rodrigues, SO Abeka - Industry 4.0 Challenges in …, 2022 - Springer
Abstract Internet of Things (IoT) security is a major concern owing to the sensitive data that
flows in these networks. The fifth generation (5G) network provides high bandwidth …