Nothing Special   »   [go: up one dir, main page]

Biamis et al., 2020 - Google Patents

5G security and the Internet of Things

Biamis et al., 2020

Document ID
11269124037130748282
Author
Biamis A
Curran K
Publication year
Publication venue
Security and Organization within IoT and Smart Cities

External Links

Snippet

5G is the “Fifth Generation” of cellular network technology. It has faster speeds, lower latency and a much larger capacity than previous generations. However, there are many security concerns regarding the future of 5G and how it will change the scope of the Internet of …
Continue reading at www.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
Singh et al. Hierarchical security paradigm for iot multiaccess edge computing
Chahid et al. Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art
Salahdine et al. Security in 5G and beyond recent advances and future challenges
Chopra et al. A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions
Masoodi et al. Security & privacy threats, attacks and countermeasures in Internet of Things
Qiu et al. Study on Security and Privacy in 5G‐Enabled Applications
Shokoor et al. Overview of 5G & beyond security
CN107276983A (en) A kind of the traffic security control method and system synchronous with cloud based on DPI
CN109995769B (en) Multi-stage heterogeneous trans-regional full-real-time safety management and control method and system
Mahyoub et al. Security analysis of critical 5g interfaces
Guo Survey on wifi infrastructure attacks
Kaur Wired LAN and wireless LAN attack detection using signature based and machine learning tools
Biamis et al. 5G security and the Internet of Things
Pavia et al. The evolution and future perspective of security in mobile communications networks
Hadi Types of attacks in wireless communication networks
AlAali et al. Cybersecurity threats and solutions of IoT network layer
Kalhoro et al. An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.
Lee et al. Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network
Timčenko et al. Attack identification and classification in V2X scenarios
Coêlho et al. A survey of the characteristics of SDN, NFV and information security in IoT and 5G networks
Singh et al. A Defense in Depth with Zero Trust Architecture for Securing 5G Networks
Alodat Effect man-in the middle on the network performance in various attack strategies
Zhao et al. Collaborative 5g multiaccess computing security: Threats, protection requirements and scenarios
Bhagat et al. A Comprehensive Analysis of 5G Security Core Technologies and Services: Conceptual Frameworks, Challenges, and Solutions
Ghosh et al. Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks