2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V) 2020
DOI: 10.1109/icte-v50708.2020.9113777
|View full text |Cite
|
Sign up to set email alerts
|

Modeling for Malicious Traffic Detection in 6G Next Generation Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…Those aforementioned issues augment the chances of cyber attacks to IoT systems, namely plants, transportation and household appliances [9], demanding substantial improvement in terms of authentication from remote systems, encryption from new sensors, and web interface and computer software for intrusion detection [46]. Additionally, the more IoT innovation, the more development in wireless tech-nologies, as well, such as the 5G, optimized well beyond voice and data, offering thus a vast array of opportunities [15,47].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
See 3 more Smart Citations
“…Those aforementioned issues augment the chances of cyber attacks to IoT systems, namely plants, transportation and household appliances [9], demanding substantial improvement in terms of authentication from remote systems, encryption from new sensors, and web interface and computer software for intrusion detection [46]. Additionally, the more IoT innovation, the more development in wireless tech-nologies, as well, such as the 5G, optimized well beyond voice and data, offering thus a vast array of opportunities [15,47].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
“…The literature review we present in this piece of literature, also suggest a set of security solutions for cordless sensor networks with respect to IoT [48,49,50]. In par-ticular, in terms of network computing, of decentralized architectures, made up of countless objects [15], such as the Blockchain [25] and cloud computing systems that ease network management and configuration [51,52], ameliorating thus the IoT secu-rity [53], through sensors that optimize the sending of data, avoiding thus the redun-dancy in the wireless channels by systems such as big data that improve networking [18,30,54,55].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, due to the countless existing IoTbased connected devices, society is also becoming increasingly vulnerable to cyber-attacks such as denial-of-service attacks [13] by hackers and insiders, for instance, that deny direct access to devices, etc. [14,15]. Technology is increasingly more central in our daily lives, which means that cybercrime and cybersecurity tools evolve concomitantly [16,17], across the whole manufacturing sector [18], which needs to invest in cybersecurity countermeasures, while new technologies are emerging for IoT cybersecurity management [19].…”
Section: Introductionmentioning
confidence: 99%