International Conference of Numerical Analysis and Applied Mathematics Icnaam 2019 2020
DOI: 10.1063/5.0027358
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things security techniques: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Recently, a number of existing survey papers have been published about security concerns in 5G networks and beyond. Through analyzing and comparing these papers, [4][5][6][7][8][9][10][11][12][13] one can conclude that most of the conducted research did not cover the security issues targeting all the emerging technologies, which makes it necessary to deeply investigate more the 5G security issues and attacks based on the various use cases and their countermeasures. For instance, in, [4][5][6] the authors provided a review about the security challenges and issues in 5G networks and beyond without discussing their mitigation or countermeasures strategies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, a number of existing survey papers have been published about security concerns in 5G networks and beyond. Through analyzing and comparing these papers, [4][5][6][7][8][9][10][11][12][13] one can conclude that most of the conducted research did not cover the security issues targeting all the emerging technologies, which makes it necessary to deeply investigate more the 5G security issues and attacks based on the various use cases and their countermeasures. For instance, in, [4][5][6] the authors provided a review about the security challenges and issues in 5G networks and beyond without discussing their mitigation or countermeasures strategies.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, in, [4][5][6] the authors provided a review about the security challenges and issues in 5G networks and beyond without discussing their mitigation or countermeasures strategies. In, [7][8][9][10] the authors briefly discussed some of the security attacks targeting the 5G networks without providing more details about how to effectively mitigate them.…”
Section: Introductionmentioning
confidence: 99%