Filters








6,278 Hits in 4.2 sec

5G security: Analysis of threats and solutions

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov
2017 2017 IEEE Conference on Standards for Communications and Networking (CSCN)  
In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G.  ...  However, there are pressing security challenges in these technologies besides the growing concerns for user privacy.  ...  Table I SECURITY I CHALLENGES IN 5G TECHNOLOGIES.  ... 
doi:10.1109/cscn.2017.8088621 dblp:conf/cscn/AhmadKLOYG17 fatcat:kdc66olm4nf4xdz4i2qq6g2fsa

Overview of 5G Security Challenges and Solutions

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov
2018 IEEE Communications Standards Magazine  
Therefore, this paper provides an overview of the security challenges in clouds, SDN and NFV, and the challenges of user privacy.  ...  However, securely using these technologies and providing user privacy in future wireless networks are the new concerns.  ...  TABLE I : I Security challenges in 5G technologies [7] .  ... 
doi:10.1109/mcomstd.2018.1700063 fatcat:x5ycl4dlkvhqdkgmhfvhic5e7q

5G Internet of Things: A survey

Shancang Li, Li Da Xu, Shanshan Zhao
2018 Journal of Industrial Information Integration  
This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 .  ...  The 5G networks are expected to massive expand today's IoT that can boost cellular operationgs, IoT security, and network challenges and driving the Internet future to the edge.  ...  Security assurance and Privacy concerns Security and privacy concerns include authentication, authorization, device access control, and privacy preserving in 5G-IoT.  ... 
doi:10.1016/j.jii.2018.01.005 fatcat:wst2mrwbpjgxvdqqig3yj4ofum

Convergence of 5G with Internet of Things for Enhanced Privacy [chapter]

Amreen Batool, Baoshan Sun, Ali Saleem, Jawad Ali
2021 Advances in Intelligent Systems and Computing  
Moreover, techniques used by 4G and 5G technologies for handling the issues of privacy in IoT are presented in a nutshell as a table.  ...  In this paper, we address the issue of privacy in 5th generation (5G) driven Internet of Things (IoT) and related technologies while presenting a comparison with previous technologies for communication  ...  Future work can include security of 5G and flaws presented in 5G because of integration with other technologies.  ... 
doi:10.1007/978-3-030-73100-7_22 fatcat:pma5fg3dzfb2hdkv4yqvbfsevu

Major Security Challenges in 5G Network

Tahorima Benzear Lira Abdullahi Hassan Yusuf
2022 Zenodo  
However, firmly using these technologies and providing user privacy & more security in future wireless networks are the new major concerns.  ...  Henceforth, we'll try to demonstrate the solutions of the present to these challenges and future directions for secure 5G systems strongly  ...  ACKNOWLEDGMENT We thank the authorities of the United International University, Dhaka, Bangladesh for providing an enabling environment and using their electronic resources.  ... 
doi:10.5281/zenodo.6381014 fatcat:666sivc6e5ftzg7o2riiy6euky

Overview of 5G security technology

Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi
2018 Science China Information Sciences  
In 2015, Huawei Technologies Co., Ltd. released "5G: Security Requirements and Principles Huawei White Paper" [11] , which analyzed the new security requirements and challenges of 5G and proposed an overall  ...  are comprehensively reviewed, including the applications of physical layer security, lightweight encryption, network slice security, user privacy preservation, and block chain in 5G. 5G security technology  ...  Privacy protection for user In the research and standardization process of 5G network security mechanism, enabling user privacy protection is a primary and widespread concern.  ... 
doi:10.1007/s11432-017-9426-4 fatcat:qva7tdx2xfc7lj3d5fslym6dsi

A Survey on 5G Networks on IoT

2020 Journal of the ACS Advances in Computer Science  
This paper reviews the present analysis progressive, key sanctionative technologies, and main analysis trends and challenges in 5G IoT.  ...  The 5 th generation (5G) networks are expected to aid the massive expand today's IoT, which will boost cellular operations, IoT security, and network challenges and driving the web future to the sting.  ...  Challenges facing the adoption of standards at intervals 5G-IoT are unstructured information, where security and privacy introduce challenges in information analysis protocols, etc.  ... 
doi:10.21608/asc.2020.157426 fatcat:2vr3ws4hmrcn5p73y42xuhg7sy

The Fight against COVID-19 Pandemic with 5G Technologies

Yushan Siriwardhana, Chamitha De Alwis, Gurkan Gur, Mika Ylianttila, Madhusanka Liyanage
2020 IEEE Engineering Management Review  
In response, this article presents how 5G and Internet of Things (IoT) related technologies can be efficiently utilized and developed to fight against the COVID-19 pandemic.  ...  Several use-cases on how 5G and IoT can be enablers to provide innovative solutions in the areas of telehealth, contact tracing, education, retail and supply chains, e-government/ remote office/ information  ...  However, providing efficient solutions to each of the challenges, especially in the area of security and privacy, opens up new research directions.  ... 
doi:10.1109/emr.2020.3017451 fatcat:jjbpyiwolvhulgedlbmdnp6sdq

Overview of Security of Virtual Mobile Networks [article]

Ijaz Ahmad, Ilkka Harjula, Jarno Pinola
2020 arXiv   pre-print
In this vain, this article provides an overview of the security challenges and potential solutions for VMNs.  ...  Each VMN Operator (VMNO) can have own distinct operating and support systems. However, the technologies used to enable VMNs have their own explicit security challenges and solutions.  ...  Therefore, we discuss first the security of 5G in brief and then security of each enabling technology below. A.  ... 
arXiv:2007.08871v1 fatcat:u7ehx4eqxjcelknu37izuv6ybi

Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation

Sahil Garg, Gagangeet Singh Aujla, Aiman Erbad, Joel J. P. C. Rodrigues, Min Chen, Xianbin Wang
2021 IEEE Network  
Even more, the popularity of next generation communication technologies has opened a new vertical in the form of 5G-enabled flying automation using drones.  ...  5G-enabled flying automation.  ...  He has many research contributions in the area of machine learning, big data analytics, security and privacy, Internet of Things, and cloud computing.  ... 
doi:10.1109/mnet.2021.9355047 fatcat:rtbml7qwbfehrgi53s5vy5mzzu

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
However, for now, security and privacy issues for 6G remain largely in concept.  ...  This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from  ...  Recently, the authors in [37] highlight possible security and privacy challenges in different 6G technologies and applications.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Security and trust in the 6G era

Volker Ziegler, Peter Schneider, Harish Viswanathan, Michael Montag, Satish Kanugovi, Ali Rezaki
2021 IEEE Access  
ACKNOWLEDGMENT The authors would like to thank a number of colleagues at Nokia Bell Labs with whom they had numerous discussions about security and trust for the 2030s.  ...  In particular, they would like to thank P. Baracca, K. Hatonen, I. Oliver, D. Schinianakis, M. Signorini and J. Urban for their comments on an early draft of this article.  ...  IV. 6G SECURITY TECHNOLOGY ENABLERS In our 6G security vision, we cluster security technology enablers into domains of cyber-resilience, privacy and trust, and their respective intersection as shown in  ... 
doi:10.1109/access.2021.3120143 fatcat:g5iqzb224zbq3kmsjqph5ygz5a

5G Wireless Communication Networks: Challenges in Security and Privacy

Yi Qian
2020 IEEE wireless communications  
More specifically, he has research and industry experience in wireless communications and networks, wireless sensor networks, vehicular communication networks, information and communication network security  ...  His research interests include wireless communications and networks, and information and communication network security.  ...  In this issue we are pleased to present a special issue on "Challenges and Novel Solutions for 5G Network Security, Privacy and Trust" with a collection of five articles.  ... 
doi:10.1109/mwc.2020.9170259 fatcat:f5wmfnfvszbszgbv2oxdk64pn4

Towards 6G-enabled Internet of Vehicles: Security and Privacy

D. P. Moya Osorio, I. Ahmad, J. D. Vega Sanchez, A. Gurtov, J. Scholliers, M. Kutila, P. Porambage
2022 IEEE Open Journal of the Communications Society  
will play on providing the expected level of security and privacy for the Internet of Vehicles.  ...  In this paper, we provide a timely deliberation of the role that promissory 6G enabling technologies such as artificial intelligence, network softwarisation, network slicing, blockchain, edge computing  ...  of key 6G enabling technologies and their challenges and potentials for security and privacy in IoV. 2020 [15] The applications of blockchain in IoVs towards Intelligent Transportation System (ITS)  ... 
doi:10.1109/ojcoms.2022.3143098 fatcat:vfuwuncr3vaotly7yw7yx25xyu

PRIVACY AND SECURITY ISSUES AND CHALLENGES IN 5G ENABLED VEHICULAR NETWORKS

Rajesh Kumar, Ankita Sharad, Sanjay Babu Jaiswal, Vivek Kumar Singh, Smriti Kumari
2022 Zenodo  
This paper did a relative investigation or different 3g, 4g, and 5g enabled vehicular networks and ultimately this paper bandied the security and isolation aspects for it.  ...  This paper also proposed an approach for assuring sequestration and security by integrating block chain technology to it.  ...  CONCLUSION This paper analysis shows the complete systematic security and privacy issues in 5g enabled vehicular networks.  ... 
doi:10.5281/zenodo.5893281 fatcat:sxyqv6omuna7bok5yl3x65dkri
« Previous Showing results 1 — 15 out of 6,278 results