[HTML][HTML] Survey on 5G Physical Layer Security Threats and Countermeasures

M Harvanek, J Bolcek, J Kufa, L Polak… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
With the expansion of wireless mobile networks into both the daily lives of individuals as well
as into the widely developing market of connected devices, communication is an …

A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions

F Dolente, RG Garroppo, M Pagano - Future Internet, 2023 - mdpi.com
The paper presents an experimental security assessment within two widely used open-
source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination …

Challenges and Opportunities for Global Cellular Connectivity

V Vomhoff, HD Jang, M Varvello, S Geißler… - arXiv preprint arXiv …, 2024 - arxiv.org
Traditional cellular service was designed for global connectivity, but business and logistical
constraints led to its fragmentation, with deployments limited to individual countries and …

Exploring Privacy Issues in Mission Critical Communication: Navigating 5G and Beyond Networks

P Dass, M Gräfenstein, S Köpsell - arXiv preprint arXiv:2405.01492, 2024 - arxiv.org
Mission critical communication (MCC) involves the exchange of information and data among
emergency services, including the police, fire brigade, and other first responders, particularly …

DQN-based Adaptive Network Architecture for High-Fidelity NGN Flow Classification

APC Alvin, PM Mohan, PLK Keong… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Next-generation networks (NGNs) are designed to handle the increasing demands of
modern communication, driven by a surge in data traffic and a wide array of applications …

Threat Hunting and Behaviour Analysis

SR Sindiramutty, NZ Jhanjhi… - Utilizing Generative AI for …, 2024 - books.google.com
Cybersecurity-the core of operations is represented by threat hunting and behaviour
analysis that help shield digital assets from the constantly defined cyberattacks. Looking for …

On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations

AA AbdulGhaffar, M Mahyoub… - 2024 20th International …, 2024 - ieeexplore.ieee.org
Virtualized Network Function (VNF) sharing among multiple Fifth Generation (5G) slices
allows network operators to increase the efficiency and utilization of the network. However …

Soft Tester UE: A Novel Approach for Open RAN Security Testing

J Moore, AS Abdalla, C Ueltschey… - 2024 IEEE 100th …, 2024 - ieeexplore.ieee.org
With the rise of 5G and open radio access networks (O-RAN), there is a growing demand for
customizable experimental platforms dedicated to security testing, as existing testbeds do …

A Study of XR Traffic Characteristics Under Flooding Attacks on 5G Slicing

AA Husseinat, AA AbdulGhaffar, A Matrawy - Authorea Preprints, 2024 - techrxiv.org
Network slicing (NS) plays a crucial role in 5G networks; it enables the delivery of
heterogeneous services and uses cases such as voice communication, video streaming …

Denial of Service Attack on Cellular Networks: A Perspective and Amalgamation of Different Cellular Generations

N Agarwal - Authorea Preprints, 2024 - techrxiv.org
As technology advances, the world becomes more interconnected, and cellular networks
play a crucial role. However, these networks are increasingly vulnerable to cyber-attacks …