Biamis et al., 2020 - Google Patents
5G security and the Internet of ThingsBiamis et al., 2020
- Document ID
- 11269124037130748282
- Author
- Biamis A
- Curran K
- Publication year
- Publication venue
- Security and Organization within IoT and Smart Cities
External Links
Snippet
5G is the “Fifth Generation” of cellular network technology. It has faster speeds, lower latency and a much larger capacity than previous generations. However, there are many security concerns regarding the future of 5G and how it will change the scope of the Internet of …
- 238000005516 engineering process 0 abstract description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Hierarchical security paradigm for iot multiaccess edge computing | |
Chahid et al. | Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art | |
Salahdine et al. | Security in 5G and beyond recent advances and future challenges | |
Chopra et al. | A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions | |
Masoodi et al. | Security & privacy threats, attacks and countermeasures in Internet of Things | |
Qiu et al. | Study on Security and Privacy in 5G‐Enabled Applications | |
Shokoor et al. | Overview of 5G & beyond security | |
CN107276983A (en) | A kind of the traffic security control method and system synchronous with cloud based on DPI | |
CN109995769B (en) | Multi-stage heterogeneous trans-regional full-real-time safety management and control method and system | |
Mahyoub et al. | Security analysis of critical 5g interfaces | |
Guo | Survey on wifi infrastructure attacks | |
Kaur | Wired LAN and wireless LAN attack detection using signature based and machine learning tools | |
Biamis et al. | 5G security and the Internet of Things | |
Pavia et al. | The evolution and future perspective of security in mobile communications networks | |
Hadi | Types of attacks in wireless communication networks | |
AlAali et al. | Cybersecurity threats and solutions of IoT network layer | |
Kalhoro et al. | An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios. | |
Lee et al. | Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network | |
Timčenko et al. | Attack identification and classification in V2X scenarios | |
Coêlho et al. | A survey of the characteristics of SDN, NFV and information security in IoT and 5G networks | |
Singh et al. | A Defense in Depth with Zero Trust Architecture for Securing 5G Networks | |
Alodat | Effect man-in the middle on the network performance in various attack strategies | |
Zhao et al. | Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios | |
Bhagat et al. | A Comprehensive Analysis of 5G Security Core Technologies and Services: Conceptual Frameworks, Challenges, and Solutions | |
Ghosh et al. | Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks |