2017
DOI: 10.1016/j.jnca.2017.07.007
|View full text |Cite
|
Sign up to set email alerts
|

A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(37 citation statements)
references
References 50 publications
0
37
0
Order By: Relevance
“…Furthermore, the terms "wireless backhaul" and "backhaul downlink" are all interchangeable. 3 Noticing that a detailed discussion on the clustering method is beyond the scope of this work. 4 We should pay more attention to the difference between the AP cluster and the APG in this work.…”
Section: Network Modelmentioning
confidence: 99%
“…Furthermore, the terms "wireless backhaul" and "backhaul downlink" are all interchangeable. 3 Noticing that a detailed discussion on the clustering method is beyond the scope of this work. 4 We should pay more attention to the difference between the AP cluster and the APG in this work.…”
Section: Network Modelmentioning
confidence: 99%
“…Chopra et al [40] 2017 Ultra-dense network Discuss security issues, challenges and respective solutions for 5G ultra dense wireless networks. Ferrag et al [41] 2017 Cellular networks…”
Section: Key Contributionmentioning
confidence: 99%
“…A concept of design for security has introduced to cater for the increasing complexity of IoT ecosystems and to attain a secure development life cycle [9], [10], [11]. A secure IoT device life cycle requires incorporation of security measures within every component, from securing the device, the data within the device and the communication channel between edge and the cloud service [12], [13], for the entire lifespan of the device, from deployment to decommission, as shown in Figure 1.…”
Section: Secure Iot Device Life Cyclementioning
confidence: 99%
“…The trust anchor can be implemented using hardware and software approaches. Within the target device, the root-of-trust (RoT) implements the trust anchor [11], [18], [19]. The security device uses a Proof-of-Knowledge approach based on challenge-response protocol.…”
Section: Root-of-trust (Rot) In Iot Devicesmentioning
confidence: 99%
See 1 more Smart Citation