Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

[HTML][HTML] Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

5G security challenges and solutions: a review by OSI layers

S Sullivan, A Brighente, SAP Kumar, M Conti - Ieee Access, 2021 - ieeexplore.ieee.org
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …

UAV-assisted attack prevention, detection, and recovery of 5G networks

AS Abdalla, K Powell, V Marojevic… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many
applications and services, such as precision agriculture, search and rescue, temporary …

Secure5G: A deep learning framework towards a secure network slicing in 5G and beyond

A Thantharate, R Paropkari, V Walunj… - 2020 10th annual …, 2020 - ieeexplore.ieee.org
Network Slicing will play a vital role in enabling a multitude of 5G applications, use cases,
and services. Network slicing functions will provide an end-to-end isolation between slices …

Security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - Computers & …, 2022 - Elsevier
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …

Formal analysis of 5G EAP-TLS authentication protocol using proverif

J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …

[HTML][HTML] Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems

HK Narsani, A Ranjha, K Dev, FH Memon… - Digital Communications …, 2022 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) will be essential to support mission-critical
applications of Ultra Reliable Low Latency Communication (URLLC) in futuristic Sixth …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …