[HTML][HTML] Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

5G security: Analysis of threats and solutions

I Ahmad, T Kumar, M Liyanage… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
5G will provide broadband access everywhere, entertain higher user mobility, and enable
connectivity of massive number of devices (eg Internet of Things (IoT)) in an ultrareliable and …

Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects

KN Qureshi, S Din, G Jeon… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
New integrated technologies have changed various existing fields and converted into new
and advanced data communication systems including, smart agriculture, smart homes, smart …

New privacy threat on 3G, 4G, and upcoming 5G AKA protocols

R Borgaonkar, L Hirschi, S Park, A Shaik - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Mobile communications are used by more than two-thirds of the world population who
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …

[HTML][HTML] Medical telerobotic systems: current status and future trends

S Avgousti, EG Christoforou, AS Panayides… - Biomedical engineering …, 2016 - Springer
Teleoperated medical robotic systems allow procedures such as surgeries, treatments, and
diagnoses to be conducted across short or long distances while utilizing wired and/or …

Cybersecurity challenges associated with the internet of things in a post-quantum world

OS Althobaiti, M Dohler - Ieee Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging networking paradigm connecting billions of
devices securely to the Internet. Another emerging paradigm is quantum computing which …

[HTML][HTML] Cooperative power-domain NOMA systems: an overview

M Ghous, AK Hassan, ZH Abbas, G Abbas, A Hussien… - Sensors, 2022 - mdpi.com
Interference has been a key roadblock against the effectively deployment of applications for
end-users in wireless networks including fifth-generation (5G) and beyond fifth-generation …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …