2023
DOI: 10.1016/j.jksuci.2022.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating 5G security challenges for next-gen industry using quantum computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 150 publications
0
2
0
1
Order By: Relevance
“…Recent studies have focused on the 5G security challenges 4 , technological transition 5 , 5G healthcare solutions 6 , and a practical method for 5G cellular networks to register and authenticate groups of IoT devices remotely 7 . Based on the available literature review, no study has yet investigated the extensive factors behind adopting the newly launched 5G technology as far as consumers are concerned .…”
Section: Introductionmentioning
confidence: 99%
“…Recent studies have focused on the 5G security challenges 4 , technological transition 5 , 5G healthcare solutions 6 , and a practical method for 5G cellular networks to register and authenticate groups of IoT devices remotely 7 . Based on the available literature review, no study has yet investigated the extensive factors behind adopting the newly launched 5G technology as far as consumers are concerned .…”
Section: Introductionmentioning
confidence: 99%
“…The international standard 3GPP has played an important guiding role from R15 to R19 versions, from 5G network architecture to 6G network planning and layout, from deepening 5G commercial deployment, continuing 5G-A development, researching key technologies of 6G networks, solving key requirements, and cryptographic related requirements run through it. From R15 TS33.501 [12] to the discussion of 256-bit cryptographic algorithms in R16 and R19, standards are playing an important guiding role. In addition, the Internet Engineering Task Force (IETF) continues to make efforts in the security evolution of TLS protocol, TLS1.3 version protocol has significant improvements in security, performance, and privacy, greatly enhancing the speed and performance of HTTPS (Hypertext Transfer Protocol Secure) connections; In the field of quantum, IETF has established the Post Quantum Usage Protocol (PQUIP) Working Group to coordinate encryption protocols that can resist large-scale quantum computer attacks, providing standard guidance for the security of subsequent anti quantum attack protocols.…”
Section: Feasibility Analysis Of Cryptographic Security Enhancement T...mentioning
confidence: 99%
“…Na Tabela 2.11, é possível observar algumas das principais ameaças envolvendo as principais tecnologias utilizadas nas redes 5G e 6G. Após identificar as principais ameaças relacionadas às redes 5G e 6G, os autores em [Mangla et al 2022] destacam soluções baseadas em computação quântica para lidar com ataques DoS e DDoS [Price et al 2020], MITM, replay, eavesdropping e roubo de sessão [Srivastava et al 2020], segurança em SDN e NFV [Aguado et al 2017] e segurança de redes heterogêneas [Kakkar 2020]. Técnicas de aprendizado de máquina e uso de criptografia homomórfica também são soluções que têm sido exploradas para promover segurança e privacidade em redes 5G e 6G [Koren and Prasad 2022].…”
Section: Abordagemunclassified