2023
DOI: 10.1109/msec.2023.3251888
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and Opportunities for Beyond-5G Wireless Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…With the ongoing interconnection and the increasing use of distributed applications, the available authentication options are also changing significantly. Here, the emerging challenges but also innovative approaches in the field of authentication are addressed, especially with regard to the wireless communication of the future, in relation to Beyond 5G (B5G) and the Sixth Generation (6G) (Ruzomberka, et al, 2023) wireless technologies. Machine Learning (ML) approaches as well as Zero Trust Architectures (ZTA) and zero knowledge authentication will also be considered.…”
Section: Authentication Of Tomorrow: Challenges and Approachesmentioning
confidence: 99%
“…With the ongoing interconnection and the increasing use of distributed applications, the available authentication options are also changing significantly. Here, the emerging challenges but also innovative approaches in the field of authentication are addressed, especially with regard to the wireless communication of the future, in relation to Beyond 5G (B5G) and the Sixth Generation (6G) (Ruzomberka, et al, 2023) wireless technologies. Machine Learning (ML) approaches as well as Zero Trust Architectures (ZTA) and zero knowledge authentication will also be considered.…”
Section: Authentication Of Tomorrow: Challenges and Approachesmentioning
confidence: 99%
“…Due to the special features of 6G technology, security issues might soon reach previously unheard-of heights. Due to unique propagation properties, the use of THz frequencies for communication necessitates a reevaluation of security standards (Ruzomberka et al, 2023). Massive MIMO and beamforming, which improve network performance, may unintentionally result in the emergence of new areas of attack (Fonyi, 2020).…”
Section: Introductionmentioning
confidence: 99%