A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Smart manufacturing and tactile internet based on 5G in industry 4.0: Challenges, applications and new trends

D Mourtzis, J Angelopoulos, N Panopoulos - Electronics, 2021 - mdpi.com
For many applications deployed in manufacturing networks, communication latency has
been a significant barrier. Despite the constant development of improved communication …

[PDF][PDF] DSQLR-A distributed scheduling and QoS localized routing scheme for wireless sensor network

J Jasmine, N Yuvaraj… - Recent trends in …, 2022 - researchgate.net
(WSNs) in critical monitoring applications. Such applications are characterized by
considerable network load generated as a result of sensing some characteristics of the …

Overview of 5G security challenges and solutions

I Ahmad, T Kumar, M Liyanage… - IEEE …, 2018 - ieeexplore.ieee.org
5G networks will use novel technological concepts to meet the requirements of broadband
access everywhere, high user and device mobility, and connectivity of massive number of …

5G support for industrial IoT applications—challenges, solutions, and research gaps

P Varga, J Peto, A Franko, D Balla, D Haja, F Janky… - Sensors, 2020 - mdpi.com
Industrial IoT has special communication requirements, including high reliability, low
latency, flexibility, and security. These are instinctively provided by the 5G mobile …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap

LL Dhirani, E Armstrong, T Newe - Sensors, 2021 - mdpi.com
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and
intelligent factory setup improving manufacturing processes and efficiency. To achieve this …

5G, 6G, and Beyond: Recent advances and future challenges

F Salahdine, T Han, N Zhang - Annals of Telecommunications, 2023 - Springer
With the high demand for advanced services and the increase in the number of connected
devices, current wireless communication systems are required to expand to meet the users' …

MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …