2020
DOI: 10.1109/access.2020.3046325
|View full text |Cite
|
Sign up to set email alerts
|

Bio-Inspired Network Security for 5G-Enabled IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(27 citation statements)
references
References 57 publications
0
13
0
1
Order By: Relevance
“…E-health, networked vehicles and traffic systems and advanced mobile cloud gaming were formerly considered futuristic. One can contribute to a brighter, safer and more sustainable future with 5G technology (Savazzi et al , 2019; Saleem et al , 2020).…”
Section: G Technologies and Types Of Network Used In 5gmentioning
confidence: 99%
“…E-health, networked vehicles and traffic systems and advanced mobile cloud gaming were formerly considered futuristic. One can contribute to a brighter, safer and more sustainable future with 5G technology (Savazzi et al , 2019; Saleem et al , 2020).…”
Section: G Technologies and Types Of Network Used In 5gmentioning
confidence: 99%
“…Wadhaj et al [21] have developed a preventive technique towards attack on IoT device using RPL protocol with a target to maximize the reliability score of attacker identification process. Saleem et al [22] have used a bio-inspired approach towards securing IoT communication over 5G. Ramos et al [23] have carried out an investigation toward analyzing security aspects of resourceconstrained IoT devices using probabilistic model.…”
Section: Related Workmentioning
confidence: 99%
“…Apart from generic threats like DoS, other threats from the network layer perspective include man-in-the-middle attack, IP Spoofing, injection, eavesdropping, packet sniffing, and Gateway attacks represent a significant threat. Due to the new technologies in 5G, specialized threats such as virtualization and multi-edge computing, edge node overload, and abusing of edge open APIs need to be taken into consideration [101]. One of the innovations that is proposed in 5G network standard is network slicing, which has unique security challenges.…”
Section: A Vulnerabilities and Threatsmentioning
confidence: 99%
“…We will discuss different security measures in the Physical layer section to provide base station to UE security solutions. Saleem et al propose in [101] bio-inspired techniques to address several types of network attacks. However, the authors have not implemented and evaluated their approach [101].…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%
See 1 more Smart Citation