2022
DOI: 10.1002/spy2.271
|View full text |Cite
|
Sign up to set email alerts
|

Security in5Gand beyond recent advances and future challenges

Abstract: 5G, 6G, and beyond (xG) technologies aim at delivering emerging services with new requirements and challenges, enabling full and hyper mobile connectivity over the world. These beyond 5G networks are expected to ensure better quality of service, very high data rate, improved network security, high capacity, low latency, and low cost. In order to meet these objectives, a number of key enabler technologies have been proposed including massive multiple input multiple output, small cells, mobile edge computing, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(14 citation statements)
references
References 133 publications
1
13
0
Order By: Relevance
“…Globally, scientists are conducting fundamental research and development in the disciplines of 6G and quantum technology [138]. Quantum computers will have demonstrated ‘quantum supremacy’ over classical computers in specific tasks by 2025, but they are not yet commercially viable [139].…”
Section: Quantum Information Technologies In 6g Networkmentioning
confidence: 99%
“…Globally, scientists are conducting fundamental research and development in the disciplines of 6G and quantum technology [138]. Quantum computers will have demonstrated ‘quantum supremacy’ over classical computers in specific tasks by 2025, but they are not yet commercially viable [139].…”
Section: Quantum Information Technologies In 6g Networkmentioning
confidence: 99%
“…Many of the scrutinised articles focus on adding protective layers, such as ML, without fully addressing all IoT characteristics and the three basic principles of security which are confidentiality, integrity and availability concurrently [8]. While recent studies, such as those conducted by the authors in [9] and [10] explore the use of emerging technologies and threats, human-centric issues and the mechanisms that lead to data exploitation through legitimate means are not investigated. Consequently, the preliminary investigation has identified the following issues related to cyber security vulnerabilities surrounding IoT data privacy concerns.…”
Section: A Problem Domainmentioning
confidence: 99%
“…A particular challenge in securing IoT devices on 5GBN is compliance with different standards across jurisdictions for devices that can have a global reach [139], [140]. While the authors investigate the introduction of regulations to enhance 5G and beyond network security [9], previous research has illustrated several challenges of this approach. As identified by [139], [140] and [141], ensuring that the data that IoT devices collect and transmit meets all regulatory requirements is challenging.…”
Section: ) Iot Standards Challengesmentioning
confidence: 99%
“…This research article explores challenges in 5G-based vehicular communication, including the use of heterogeneous and small cell networks, millimeter-wave communication, massive multiple-input, multipleoutput (MIMO) networks, vehicular cloud and fog computing, SDNs, mobile edge computing, network slicing, and dynamic spectrum sharing. The article offers solutions to these challenges and suggests future research directions for vehicular communication [113,114].…”
Section: Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%