2022
DOI: 10.1016/j.iot.2022.100610
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent authentication of 5G healthcare devices: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(16 citation statements)
references
References 122 publications
0
16
0
Order By: Relevance
“…They then reviewed some of the existing and proposed security solutions for 5G and 6G networks, such as encryption, authentication, access control, network slicing, edge computing, and blockchain. Sodhro et al [20] conducted a survey on intelligent authentication mechanisms for IoT 5G devices in healthcare. They explored how AI can be used to integrate the physical layer and 5G networks to improve the performance of smart healthcare devices.…”
Section: Physical Layer Authentication (Pla)mentioning
confidence: 99%
“…They then reviewed some of the existing and proposed security solutions for 5G and 6G networks, such as encryption, authentication, access control, network slicing, edge computing, and blockchain. Sodhro et al [20] conducted a survey on intelligent authentication mechanisms for IoT 5G devices in healthcare. They explored how AI can be used to integrate the physical layer and 5G networks to improve the performance of smart healthcare devices.…”
Section: Physical Layer Authentication (Pla)mentioning
confidence: 99%
“…This can leave software systems vulnerable to attacks, such as unauthorized access or privilege escalation. The researchers in [142] and [143] point out that weak authentication mechanisms, such as the use of weak passwords or insufficient authentication protocols, can lead to unauthorized access [144]. Inadequate authorization controls may allow unauthorized users to gain elevated privileges or access sensitive functionalities [145], [146].…”
Section: Social Engineering Attacksmentioning
confidence: 99%
“…All things considered, the maker of a block is haphazardly picked in light of the member's responsibility for (i.e., the more stake a member has, the more probable it can turn into a block maker). Under this situation, how much tokens one hub holds turns into the obstruction of the personality fashion [26]. At the end of the day, the framework gatecrashers should hold a larger part of the coins available for use to perform 51% assault.…”
Section: ■ 302 a Proof Of Stake (Pos)mentioning
confidence: 99%