[HTML][HTML] Security requirements and challenges of 6G technologies and applications
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …
generation wireless network technology (6G). 6G is expected to be implemented around the …
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
5G security: Analysis of threats and solutions
5G will provide broadband access everywhere, entertain higher user mobility, and enable
connectivity of massive number of devices (eg Internet of Things (IoT)) in an ultrareliable and …
connectivity of massive number of devices (eg Internet of Things (IoT)) in an ultrareliable and …
Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects
New integrated technologies have changed various existing fields and converted into new
and advanced data communication systems including, smart agriculture, smart homes, smart …
and advanced data communication systems including, smart agriculture, smart homes, smart …
New privacy threat on 3G, 4G, and upcoming 5G AKA protocols
Mobile communications are used by more than two-thirds of the world population who
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …
[HTML][HTML] Medical telerobotic systems: current status and future trends
Teleoperated medical robotic systems allow procedures such as surgeries, treatments, and
diagnoses to be conducted across short or long distances while utilizing wired and/or …
diagnoses to be conducted across short or long distances while utilizing wired and/or …
Cybersecurity challenges associated with the internet of things in a post-quantum world
OS Althobaiti, M Dohler - Ieee Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of
devices securely to the Internet. Another emerging paradigm is quantum computing which …
devices securely to the Internet. Another emerging paradigm is quantum computing which …
[HTML][HTML] Cooperative power-domain NOMA systems: an overview
Interference has been a key roadblock against the effectively deployment of applications for
end-users in wireless networks including fifth-generation (5G) and beyond fifth-generation …
end-users in wireless networks including fifth-generation (5G) and beyond fifth-generation …
Survey on threats and attacks on mobile networks
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …
to evolve, bringing into the network architecture new interfaces and protocols, as well as …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …