A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …
and biosensors those have assisted in the rapid development of implanting wearable …
A survey of device-to-device communications: Research issues and challenges
Device-to-Device (D2D) communication has emerged as a promising technology for
optimizing spectral efficiency in future cellular networks. D2D takes advantage of the …
optimizing spectral efficiency in future cellular networks. D2D takes advantage of the …
The role of 5G technologies: Challenges in smart cities and intelligent transportation systems
The new mobile technology, 5G, challenges the current scenario in communications by
overcoming the flaws of currently working 4G. Such new technology offers to smart cities and …
overcoming the flaws of currently working 4G. Such new technology offers to smart cities and …
A survey on security aspects for 3GPP 5G networks
With the continuous development of mobile communication technologies, Third Generation
Partnership Project (3GPP) has proposed related standards with the fifth generation mobile …
Partnership Project (3GPP) has proposed related standards with the fifth generation mobile …
Security and privacy for the internet of medical things enabled healthcare systems: A survey
With the increasing demands on quality healthcare and the raising cost of care, pervasive
healthcare is considered as a technological solutions to address the global health issues. In …
healthcare is considered as a technological solutions to address the global health issues. In …
Security for 5G mobile wireless networks
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …
requirements and challenges. This paper presents a comprehensive study on the security of …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …
existing scope of science. The concepts of automated driving, augmented-reality, and …
An intrusion detection mechanism for secured IoMT framework based on swarm-neural network
The seamless integration of medical sensors and the Internet of Things (IoT) in smart
healthcare has leveraged an intelligent Internet of Medical Things (IoMT) framework to …
healthcare has leveraged an intelligent Internet of Medical Things (IoMT) framework to …
A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks
Abstract Wireless Sensor Network (WSN) and Mobile Ad hoc Network (MANET) have
attracted a special attention because they can serve as communication means in many …
attracted a special attention because they can serve as communication means in many …