Security and privacy for 6G: A survey on prospective technologies and challenges
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …
ground integrated network environment, novel technologies, and an accessible user …
[HTML][HTML] Security requirements and challenges of 6G technologies and applications
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …
generation wireless network technology (6G). 6G is expected to be implemented around the …
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
5G security challenges and solutions: a review by OSI layers
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …
services compared to previous generations, supporting an increased number of use cases …
UAV-assisted attack prevention, detection, and recovery of 5G networks
AS Abdalla, K Powell, V Marojevic… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many
applications and services, such as precision agriculture, search and rescue, temporary …
applications and services, such as precision agriculture, search and rescue, temporary …
Secure5G: A deep learning framework towards a secure network slicing in 5G and beyond
Network Slicing will play a vital role in enabling a multitude of 5G applications, use cases,
and services. Network slicing functions will provide an end-to-end isolation between slices …
and services. Network slicing functions will provide an end-to-end isolation between slices …
Security of open radio access networks
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …
Formal analysis of 5G EAP-TLS authentication protocol using proverif
J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …
plays a role of the first safeguard in ensuring the communication security, such as the …
[HTML][HTML] Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems
Abstract Unmanned Aerial Vehicles (UAVs) will be essential to support mission-critical
applications of Ultra Reliable Low Latency Communication (URLLC) in futuristic Sixth …
applications of Ultra Reliable Low Latency Communication (URLLC) in futuristic Sixth …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …