Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …

[PDF][PDF] Deep learning enabled secure IoT handover authentication for blockchain networks

MM Salim, V Shanmuganathan, V Loia… - Human-centric Computing …, 2021 - hcisj.com
Blockchain is an emerging key technology for safeguarding telecommunications networks
against rogue base stations. Combining Internet of Things (IoT) devices with a decentralized …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

The potential short-and long-term disruptions and transformative impacts of 5G and beyond wireless networks: Lessons learnt from the development of a 5G testbed …

MN Patwary, SJ Nawaz, MA Rahman, SK Sharma… - Ieee …, 2020 - ieeexplore.ieee.org
The capacity and coverage requirements for 5 th generation (5G) and beyond wireless
connectivity will be significantly different from the predecessor networks. To meet these …

Formal analysis of 5G EAP-TLS authentication protocol using proverif

J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …

An improved and provably secure symmetric-key based 5G-AKA Protocol

AK Yadav, M Misra, PK Pandey, A Braeken… - Computer Networks, 2022 - Elsevier
One of the primary authentication mechanisms defined for the 5G system is the 5G-
Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next …

[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol

J Munilla, M Burmester, R Barco - Computer Networks, 2021 - Elsevier
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …