2020
DOI: 10.1007/978-3-030-60467-7_3
|View full text |Cite
|
Sign up to set email alerts
|

5G Network Security for IoT Implementation: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…By using sinkhole, the attacker can prevent the server and other nodes to obtain correct data by misrounting legitimate packets and also by sending fabricated information. This attack can also be used to collect sensitive information from the network [76].…”
Section: Routing Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…By using sinkhole, the attacker can prevent the server and other nodes to obtain correct data by misrounting legitimate packets and also by sending fabricated information. This attack can also be used to collect sensitive information from the network [76].…”
Section: Routing Attacksmentioning
confidence: 99%
“…Most of the reviewed papers addressing recommendations presented secondary studies (e.g., [69,134]). Examples of general recommendations are listed below: Other recommendations include the usage of intrusion detection systems [6,20,36,[135][136][137], threat detection systems [65], early warning systems [138], anomaly detection systems [61], code clone detection [44], post-quantum cryptography [69], lightweight cryptography [37,68,134,139,140], temporary identity [141], authentication [4,7,9,49,52,70,79,108,142], authorization [78], blockchain [30,38,76,[143][144][145], perception layer security [10,146,147], covert timing channels [148], end-to-end security [149], key management [34], secure exchanging data [26], and frequent key update [150].…”
Section: Recommendationsmentioning
confidence: 99%