2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) 2018
DOI: 10.1109/gcwcn.2018.8668635
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats and Challenges in Future Mobile Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…In [23], authors have summarized some technologies like SDN, NFV, and cloud computing technologies to be used for the IoT environment for providing the security. So these concepts will be useful for 5G and 6G technology development in the future.…”
Section: Semantic Iot Interoperability Terminologiesmentioning
confidence: 99%
“…In [23], authors have summarized some technologies like SDN, NFV, and cloud computing technologies to be used for the IoT environment for providing the security. So these concepts will be useful for 5G and 6G technology development in the future.…”
Section: Semantic Iot Interoperability Terminologiesmentioning
confidence: 99%
“…Current cellular networks will not be sufficient to handle the enormous amount of increase in data traffic required 2 . 5G is characterized by 100% availability, up to 10‐year increase in devices' battery life, 90% reduction in network power consumption, and connectivity throughput up to 10 Gbps 3 . Moreover in Kaneriya et al, 4 they explored the possibility of full‐duplex 5G communications for monitoring systems in the sphere of ambient assisted living (AAL) which simplify and automate processes that do not require human intervention.…”
Section: Introductionmentioning
confidence: 99%
“…Physical‐layer security (PLS), an interesting wireless security approach for 5G networks, can mitigate physical‐layer threats using multiple wireless techniques such as massive multiple‐input‐multiple‐output (mMIMO), non‐orthogonal‐multiple‐access (NOMA), millimeter wave (mmWave), and visible light communication (VLC) (Figure 2). PLS is an optimal security approach for 5G wireless networks for its lower computational complexity and larger scalability 3 . Physical‐layer threats are primarily divided into two categories, based on the purpose of the attacker, passive and active attacks which include jamming, contaminating, eavesdropping, and spoofing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The statement above defines it as a more open and independent system that benefits in terms of content transfer and interaction, but it also possesses challenges like the need of more bandwidth for transfer of massive content as well as low latency and security. IoT is an open network in terms of devices connected as any node is malicious to another node which rises trust and privacy issue in IoT [1][2][3]. Currently, IoT is deployed on current technology 4G that lacks the inability to address the challenges of IoT specifically bandwidth and privacy [4].…”
Section: Introductionmentioning
confidence: 99%