5g security
Recently Published Documents


TOTAL DOCUMENTS

46
(FIVE YEARS 32)

H-INDEX

9
(FIVE YEARS 3)

Author(s):  
Thota Guna Durga Prashanth

Abstract: Ensuring the organizations of tomorrow is set to be a difficult space due to expanding digital protection dangers and enlarging assault surfaces made by the Internet of Things (IoT), expanded organization heterogeneity, expanded utilization of virtualisation innovations and circulated structures. This paper proposes SDS (Software Defined Security) which is a method gives mechanized, adaptable and versatile framework. SDS will tackle momentum progresses in AI to plan a CNN (Convolutional Neural Network) utilizing NAS (Neural Architecture Search) to distinguish irregular organization traffic. SDS can be applied to an interruption location framework to make a more proactive and start to finish protection for a 5G organization. To test this presumption, ordinary and irregular organization streams from a mimicked climate have been gathered and examined with a CNN. The outcomes from this strategy are promising as the model has recognized harmless traffic with a 100% exactness rate and irregular traffic with a 96.4% identification rate. This exhibits the viability of organization stream investigation for an assortment of normal pernicious assaults and furthermore gives a suitable alternative to discovery of encoded vindictive organization traffic. Keywords: 5G Security, IoT Security, Automated Intrusion Detection Systems, Convolutional Neural Networks, Artificial Intelligence, Software Defined Security


2021 ◽  
pp. 89-98
Author(s):  
Tahamina Yesmin ◽  
Sarmistha Agasti ◽  
Kisalaya Chakrabarti

2021 ◽  
Vol 123 ◽  
pp. 102667
Author(s):  
Amir Afaq ◽  
Noman Haider ◽  
Muhammad Zeeshan Baig ◽  
Komal S. Khan ◽  
Muhammad Imran ◽  
...  

2021 ◽  
pp. 203-223
Author(s):  
José María Jorquera Valero ◽  
Pedro Miguel Sánchez Sánchez ◽  
Alexios Lekidis ◽  
Pedro Martins ◽  
Pedro Diogo ◽  
...  

2021 ◽  
Author(s):  
Anna Angelogianni ◽  
Ilias Politis ◽  
Pier Luigi Polvanesi ◽  
Antonio Pastor ◽  
Christos Xenakis

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5524
Author(s):  
Seongmin Park ◽  
Daeun Kim ◽  
Youngkwon Park ◽  
Hyungjin Cho ◽  
Dowon Kim ◽  
...  

Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
M. Najmul Islam Farooqui ◽  
Junaid Arshad ◽  
Muhammad Mubashir Khan

PurposeAlongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting contributions made by the research community and identify research trends within different subdomains of 5G security where open issues still exist.Design/methodology/approachThis paper uses a bibliographic approach to review the state-of-the-art in the field of 5G security and is the pioneering effort to investigate 5G security research using this methodology. Specifically, the paper presents a quantitative description of the existing contributions in terms of authors, organizations, and countries. It then presents detailed keyword and co-citation analysis that shows the quantity and pattern of research work in different subfields. Finally, 5G security areas are identified having open challenges for future research work.FindingsThe study shows that China leads the world in terms of published research in the field of 5G security with USA and India ranked second and third respectively. Xidian University, China is ranked highest for number of publications and h-index followed by University Oulu and AALTO University Finland. IEEE Access, Sensors and IEEE Internet of Things Journal are the top publication venues in the field of 5G security. Using VOSViewer aided analysis with respect to productivity, research areas and keywords, the authors have identified research trends in 5G security among scientific community whilst highlighting specific challenges which require further efforts.Originality/valueExisting studies have focused on surveys covering state-of-the art research in secure 5G network (Zhang et al. 2019), physical layer security (Wu et al., 2018), security and privacy of 5G technologies (Khan et al., 2020) and security and privacy challenges when 5G is used in IoT (Sicari et al. 2020). However, our research has revealed no existing bibliometric studies in this area and therefore, to our best knowledge, this paper represents pioneering such effort for security within 5G.


Sign in / Sign up

Export Citation Format

Share Document