2022
DOI: 10.1049/cmu2.12327
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review on the users’ identity privacy for 5G networks

Abstract: Fifth Generation (5G) is the final generation in mobile communications, with minimum latency, high data throughput, and extra coverage. The 5G network must guarantee very good security and privacy levels for all users for these features. Therefore, researchers have deliberated the privacy and security solution of 5G users. The 5G wireless network offers a futuristic concept that helps to solve challenges affecting previous communications generations. The key concern to many scholars in the field of mobile netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(3 citation statements)
references
References 92 publications
0
3
0
Order By: Relevance
“…In multilink IoV, in order to solve the problem that centralized resource management cannot meet the rapid change of channels, resource sharing in IoV is modeled as a multiagent reinforcement learning problem of distributed execution, and then, deep Q network method based on fingerprint is used to solve this problem. is improves the transmission capability of the link and enhances the privacy of the link [25]. To sum up, the challenges facing the IoV in the future are as follows: centralized resource management, joint optimization management of multidimensional resources such as computing, storage and communication, and efficiency of resource allocation algorithm in the complex and changeable communication environment.…”
Section: Related Workmentioning
confidence: 99%
“…In multilink IoV, in order to solve the problem that centralized resource management cannot meet the rapid change of channels, resource sharing in IoV is modeled as a multiagent reinforcement learning problem of distributed execution, and then, deep Q network method based on fingerprint is used to solve this problem. is improves the transmission capability of the link and enhances the privacy of the link [25]. To sum up, the challenges facing the IoV in the future are as follows: centralized resource management, joint optimization management of multidimensional resources such as computing, storage and communication, and efficiency of resource allocation algorithm in the complex and changeable communication environment.…”
Section: Related Workmentioning
confidence: 99%
“…Once malicious illegal terminals access the system, they can easily crash the charging facility, steal charging vehicles' information, and even further implant viruses to make vehicles uncontrollable. Though the 5G protocol optimizes identity security by introducing temporary identification [1], malicious illegal devices can still access the system by forging legal identification. Therefore, it is necessary to design a more reliable access authentication scheme for a vehicle charging network system to ensure system security and full function.…”
Section: Introductionmentioning
confidence: 99%
“…The Wi-Fi network selection method specified in the Wi-Fi calling standard [34][35][36] does not provide any mechanism to verify the legitimacy of the network. The network selection is only based on radio parameters, which means that terminals using Wi-Fi calling technology are vulnerable to MitM attacks [37][38][39].…”
mentioning
confidence: 99%