2020
DOI: 10.1016/j.inffus.2020.04.009
|View full text |Cite
|
Sign up to set email alerts
|

A survey on secure communication techniques for 5G wireless heterogeneous networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 315 publications
0
5
0
2
Order By: Relevance
“…The review of related literature begins with the discussion of the joint implementation of 5G and CHAOS so that automated networks can be achieved as shown in Figure 3. In this work, adaptive routing is applied in multimedia communications so that 5G constraints can be eliminated [25]. In Software-defined networking, the concept of transparency is supported, thereby leading to the programming of network devices.…”
Section: Aim Of Studymentioning
confidence: 99%
“…The review of related literature begins with the discussion of the joint implementation of 5G and CHAOS so that automated networks can be achieved as shown in Figure 3. In this work, adaptive routing is applied in multimedia communications so that 5G constraints can be eliminated [25]. In Software-defined networking, the concept of transparency is supported, thereby leading to the programming of network devices.…”
Section: Aim Of Studymentioning
confidence: 99%
“…This expansion, as demonstrated in the threat assessment phase, mandates a comprehensive approach to secure these communication channels, thereby fortifying the ACN system against a diverse range of potential breaches. A very relevant branch of the literature is mainly focused on securing physical layers on heterogeneous networks [60,61]. Continuing the discourse, major improvements in the reliability of the solutions analyzed may be the implementation of satellite communication leading to the research undergoing for the sixth generation of cellular networks [62].…”
Section: Encryption Authentication and Access Controlmentioning
confidence: 99%
“…O aumento na comunicação através da rede 5G representa uma disruptura na segurança e privacidade de dados transmitidos, principalmente no que diz respeito à criptografia. Métodos para garantir a segurança da informação, como esteganografia e criptografia caótica são modelos apontados como adequados para aplicações em tempo real [Kakkar, 2020], que serão utilizadas amplamente com a chegada da rede 5G. Wang et.…”
Section: Aprendizado Federadounclassified