[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …

Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G

J Wang, H Han, H Li, S He… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Due to high capacity and fast transmission speed, 5G plays a key role in modern electronic
infrastructure. Meanwhile, sparse tensor factorization (STF) is a useful tool for dimension …

The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges

SK Khan, U Naseem, H Siraj, I Razzak… - Transactions on …, 2021 - Wiley Online Library
Next‐generation wireless communication networks, in particular, the densified 5G will bring
many developments to the existing telecommunications industry. The key benefits will be the …

Strategic analysis and development plan design on digital transformation in the energy industry: A global perspective

P Liu, C Lu - International Journal of Energy Research, 2021 - Wiley Online Library
This paper conducts strategic analysis and development plan design of energy digital
transformation from a global perspective. First, this paper analyzes the reasons for the digital …

Machine learning for 5G security: Architecture, recent advances, and challenges

A Afaq, N Haider, MZ Baig, KS Khan, M Imran, I Razzak - Ad Hoc Networks, 2021 - Elsevier
The granularization of crucial network functions implementation using software-centric, and
virtualized approaches in 5G networks have brought forth unprecedented security …

Bio-inspired network security for 5G-enabled IoT applications

K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …

Multi-layer attack graph analysis in the 5g edge network using a dynamic hexagonal fuzzy method

HA Kholidy - Sensors, 2021 - mdpi.com
Overall, 5G networks are expected to become the backbone of many critical IT applications.
With 5G, new tech advancements and innovation are expected; 5G currently operates on …

Network slicing security controls and assurance for verticals

T Wichary, J Mongay Batalla, CX Mavromoustakis… - Electronics, 2022 - mdpi.com
This paper focuses on the security challenges of network slice implementation in 5G
networks. We propose that network slice controllers support security by enabling security …

Cyber security threats for 5G networks

JP Mohan, N Sugunaraj… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
The fifth-generation mobile network (5G) services have the potential to provide high-speed
connectivity to a large user base with excellent benchmarks on low latencies, large capacity …