2023
DOI: 10.1016/j.comnet.2022.109515
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 63 publications
0
10
0
Order By: Relevance
“…A Wi-Fi access point spans an area of up to 1 km radius. Wi-Fi networks are occasionally flooded with large amounts of data, and unintended users can gain access or cause interference due to poor encryption [148]. Cellular or mobile networks are characterized by high cost and high data throughput, reaching speeds of several Gbps, and low latency.…”
Section: Wireless Sensor Network For Water Quality Sensingmentioning
confidence: 99%
“…A Wi-Fi access point spans an area of up to 1 km radius. Wi-Fi networks are occasionally flooded with large amounts of data, and unintended users can gain access or cause interference due to poor encryption [148]. Cellular or mobile networks are characterized by high cost and high data throughput, reaching speeds of several Gbps, and low latency.…”
Section: Wireless Sensor Network For Water Quality Sensingmentioning
confidence: 99%
“…A forking attack is particularly hazardous for users of personal IoT devices because if the forking attack is a hard attack, it is not reversible [111]. Further security concerns of blockchain have been highlighted by the authors of [112] who identified that blockchain on a wireless network that shares database access with the network is prone to a range of security threats that can result in cybercriminals emulating a hidden node. This can result in a MIM attack or spectrum hijacking.…”
Section: Volume 4 2022mentioning
confidence: 99%
“…The development of B5G/6G will impact the extension of many technologies, such as IoT devices, edge computing, fog computing etc. [1–5]. However, to maintain signal quality and customer coverage, Taiwan's four major telecom operators have introduced VoWi‐Fi calling services, which provide cellular calls and text messages to mobile users through home/public Wi‐Fi networks instead of cellular base stations.…”
Section: Introductionmentioning
confidence: 99%