[HTML][HTML] Survey on 5G Physical Layer Security Threats and Countermeasures
With the expansion of wireless mobile networks into both the daily lives of individuals as well
as into the widely developing market of connected devices, communication is an …
as into the widely developing market of connected devices, communication is an …
A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
F Dolente, RG Garroppo, M Pagano - Future Internet, 2023 - mdpi.com
The paper presents an experimental security assessment within two widely used open-
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …
Challenges and Opportunities for Global Cellular Connectivity
Traditional cellular service was designed for global connectivity, but business and logistical
constraints led to its fragmentation, with deployments limited to individual countries and …
constraints led to its fragmentation, with deployments limited to individual countries and …
Exploring Privacy Issues in Mission Critical Communication: Navigating 5G and Beyond Networks
Mission critical communication (MCC) involves the exchange of information and data among
emergency services, including the police, fire brigade, and other first responders, particularly …
emergency services, including the police, fire brigade, and other first responders, particularly …
DQN-based Adaptive Network Architecture for High-Fidelity NGN Flow Classification
APC Alvin, PM Mohan, PLK Keong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Next-generation networks (NGNs) are designed to handle the increasing demands of
modern communication, driven by a surge in data traffic and a wide array of applications …
modern communication, driven by a surge in data traffic and a wide array of applications …
Threat Hunting and Behaviour Analysis
SR Sindiramutty, NZ Jhanjhi… - Utilizing Generative AI for …, 2024 - books.google.com
Cybersecurity-the core of operations is represented by threat hunting and behaviour
analysis that help shield digital assets from the constantly defined cyberattacks. Looking for …
analysis that help shield digital assets from the constantly defined cyberattacks. Looking for …
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations
AA AbdulGhaffar, M Mahyoub… - 2024 20th International …, 2024 - ieeexplore.ieee.org
Virtualized Network Function (VNF) sharing among multiple Fifth Generation (5G) slices
allows network operators to increase the efficiency and utilization of the network. However …
allows network operators to increase the efficiency and utilization of the network. However …
Soft Tester UE: A Novel Approach for Open RAN Security Testing
J Moore, AS Abdalla, C Ueltschey… - 2024 IEEE 100th …, 2024 - ieeexplore.ieee.org
With the rise of 5G and open radio access networks (O-RAN), there is a growing demand for
customizable experimental platforms dedicated to security testing, as existing testbeds do …
customizable experimental platforms dedicated to security testing, as existing testbeds do …
A Study of XR Traffic Characteristics Under Flooding Attacks on 5G Slicing
AA Husseinat, AA AbdulGhaffar, A Matrawy - Authorea Preprints, 2024 - techrxiv.org
Network slicing (NS) plays a crucial role in 5G networks; it enables the delivery of
heterogeneous services and uses cases such as voice communication, video streaming …
heterogeneous services and uses cases such as voice communication, video streaming …
Denial of Service Attack on Cellular Networks: A Perspective and Amalgamation of Different Cellular Generations
N Agarwal - Authorea Preprints, 2024 - techrxiv.org
As technology advances, the world becomes more interconnected, and cellular networks
play a crucial role. However, these networks are increasingly vulnerable to cyber-attacks …
play a crucial role. However, these networks are increasingly vulnerable to cyber-attacks …