2021
DOI: 10.1007/s11036-021-01841-2
|View full text |Cite
|
Sign up to set email alerts
|

Security Standards and Measures for Massive IoT in the 5G Era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Qiu et al discussed security requirements and scales for large IoT in 5G time. In addition, it also proposes security requirements and scales at various levels, such as sensor control applications and IoT cards, IoT networks and transports, IoT transaction applications and services, and IoT security management and performance [5]. The sensor has two components: the sensor component and the switch component.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Qiu et al discussed security requirements and scales for large IoT in 5G time. In addition, it also proposes security requirements and scales at various levels, such as sensor control applications and IoT cards, IoT networks and transports, IoT transaction applications and services, and IoT security management and performance [5]. The sensor has two components: the sensor component and the switch component.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Node injection attacks are used to control data flow, by dropping a malicious node between the connection of two legitimate nodes, with the attacker acquiring control of the processing of any data. Another attack related to the perception layer is node tampering when the attacker changes the whole hardware or gains access to the node and acts to manipulate sensitive data generated or received by it [66][67][68][69].…”
Section: Attacks On Datamentioning
confidence: 99%
“…Most of the reviewed papers addressing recommendations presented secondary studies (e.g., [69,134]). Examples of general recommendations are listed below: Other recommendations include the usage of intrusion detection systems [6,20,36,[135][136][137], threat detection systems [65], early warning systems [138], anomaly detection systems [61], code clone detection [44], post-quantum cryptography [69], lightweight cryptography [37,68,134,139,140], temporary identity [141], authentication [4,7,9,49,52,70,79,108,142], authorization [78], blockchain [30,38,76,[143][144][145], perception layer security [10,146,147], covert timing channels [148], end-to-end security [149], key management [34], secure exchanging data [26], and frequent key update [150].…”
Section: Recommendationsmentioning
confidence: 99%
“…Several technological advances, including 5G radio access networks (5G-RAN), the Internet of Things (IoT), ultra-reliable low-latency communications (URLLC), heterogeneous networks, including small cells and machine-tomachine (M2M) communications, as well as the understanding of the mechanisms of specific methodologies, are important building blocks of the 5G air interface [3], [4]. Vehicular communication (VC) solutions, such as vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) schemes, are widely used in safety-, information-, mobility-and environmentrelated applications.…”
Section: Inrtoductionmentioning
confidence: 99%