A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
暂无分享,去创建一个
Dushantha Nalin K. Jayakody | Madhusanka Liyanage | Pardeep Kumar | Rabia Khan | Madhusanka Liyanage | Pardeep Kumar | Rabia Khan | D. Jayakody
[1] Steve Gold. The rebirth of phreaking , 2011, Netw. Secur..
[2] AKHIL GUPTA,et al. A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.
[3] Zhenyu Wen,et al. Cost Effective, Reliable, and Secure Workflow Deployment over Federated Clouds , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[4] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[5] Martin Reisslein,et al. Transport SDN at the dawn of the 5G era , 2019, Opt. Switch. Netw..
[6] Tanesh Kumar,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[7] M. Shamim Hossain,et al. Towards a Secure Mobile Edge Computing Framework for Hajj , 2017, IEEE Access.
[8] Pawani Porambage,et al. Securing Gadget-Free Digital Services , 2018, Computer.
[9] Tamma Bheemarjuna Reddy,et al. Software Defined Wireless Networks: A Survey of Issues and Solutions , 2017, Wireless Personal Communications.
[10] Andrei V. Gurtov,et al. New concepts for traffic, resource and mobility management in software-defined mobile networks , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[11] Cheng Li,et al. Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.
[12] Liang Jin,et al. Artificial noise aided polar codes for physical layer security , 2017, China Communications.
[13] Peter A. Hamilton,et al. Data Protection in OpenStack , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).
[14] Joonsang Baek,et al. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.
[15] Yueming Cai,et al. Physical layer security of non-orthogonal multiple access in cognitive radio networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[16] Dharma P. Agrawal,et al. 5G mobile technology: A survey , 2015, ICT Express.
[17] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[18] Inge Graef,et al. Mandating portability and interoperability in online social networks , 2015 .
[19] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[20] Tao Wan,et al. Comparative Analysis of Control Plane Security of SDN and Conventional Networks , 2017, IEEE Communications Surveys & Tutorials.
[21] Jin Zhang,et al. MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation , 2015, IEEE Transactions on Information Forensics and Security.
[22] Hui-Ming Wang,et al. Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.
[23] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[24] Ma,et al. Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks , 2014 .
[25] Hannes Tschofenig,et al. Authentication and Authorization for Constrained Environments (ACE) , 2017 .
[26] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[27] Mark F. Flanagan,et al. Secure communication for separated and integrated receiver architectures in SWIPT , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[28] Wen-Qin Wang,et al. Hybrid MIMO and Phased-Array Directional Modulation for Physical Layer Security in mmWave Wireless Communications , 2018, IEEE Journal on Selected Areas in Communications.
[29] Shubhranshu Singh,et al. 5G service requirements and operational use cases: Analysis and METIS II vision , 2016, 2016 European Conference on Networks and Communications (EuCNC).
[30] Mohsen Guizani,et al. Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.
[31] Hyoungshick Kim,et al. Security challenges with network functions virtualization , 2017, Future Gener. Comput. Syst..
[32] Roberto Baldoni,et al. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.
[33] Xiaoming Chen,et al. Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.
[34] Thar Baker,et al. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey , 2019, Sensors.
[35] Wenjuan Li,et al. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..
[36] Hsiao-Hwa Chen,et al. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.
[37] Andrei V. Gurtov,et al. Secured VPN Models for LTE Backhaul Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[38] Zhiyong Xu,et al. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[39] C. Emre Koksal,et al. Physical Layer Security in Massive MIMO , 2015, 1505.00396.
[40] Taekyoung Kwon,et al. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.
[41] Kathiravan Srinivasan,et al. 5G Security: Concepts and Challenges , 2019 .
[42] Karl Andersson,et al. Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey , 2019, IEEE Access.
[43] Georgios Xilouris,et al. An integrating framework for efficient NFV monitoring , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).
[44] Mohan Kumar,et al. S-NFV: Securing NFV states by using SGX , 2016, SDN-NFV@CODASPY.
[45] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[46] Andrei Gurtov,et al. A Comprehensive Guide to 5G Security , 2018 .
[47] Sven Dietrich,et al. Security Challenges and Opportunities of Software-Defined Networking , 2017, IEEE Security & Privacy.
[48] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[49] Westley Weimer,et al. Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage , 2017, RAID.
[50] Ingrid Moerman,et al. Recent Advances in 5G Technologies: New Radio Access and Networking , 2019, Wireless Communications and Mobile Computing.
[51] Joseph K. Liu,et al. Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control , 2017, Future Gener. Comput. Syst..
[52] Kahina Lazri,et al. Towards Black-Box Anomaly Detection in Virtual Network Functions , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[53] Min Chen,et al. Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.
[54] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[55] Cas J. F. Cremers,et al. Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion , 2019, NDSS.
[56] S. Rama Krishna,et al. Virtualization Security Issues and Mitigations in Cloud Computing , 2017 .
[57] Bo Ai,et al. Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.
[58] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[59] Stenio F. L. Fernandes,et al. Integrated NFV/SDN Architectures , 2018, ArXiv.
[60] Philipp Winter,et al. The Impact of User Location on Cookie Notices (Inside and Outside of the European Union) , 2019 .
[61] Victor I. Chang,et al. Location and trajectory privacy preservation in 5G-Enabled vehicle social network services , 2018, J. Netw. Comput. Appl..
[62] Sébastien Ziegler,et al. The Impact of the European General Data Protection Regulation (GDPR) on Future Data Business Models: Toward a New Paradigm and Business Opportunities , 2018, Digital Business Models.
[63] Yun Liu,et al. Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.
[64] Andrei V. Gurtov,et al. Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[65] Salim Hariri,et al. IoT Security Framework for Smart Water System , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).
[66] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[67] Tarik Taleb,et al. NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.
[68] Masayuki Murata,et al. QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks , 2017, IEEE Access.
[69] Zheng Yan,et al. Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.
[70] S. Aaronson,et al. Data is Different: Why the World Needs a New Approach to Governing Cross-Border Data Flows , 2018 .
[71] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[72] Ninghui Li,et al. Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.
[73] Rahim Tafazolli,et al. Modulation Based Non-Orthogonal Multiple Access for 5G Resilient Networks , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[74] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[75] Martin Knahl,et al. Software Defined Privacy , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).
[76] Fuad E. Alsaadi,et al. Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks , 2017 .
[77] Jianhua Ge,et al. Graph Theory Based Cooperative Transmission for Physical-Layer Security in 5G Large-Scale Wireless Relay Networks , 2017, IEEE Access.
[78] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[79] Mingkai Chen,et al. Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.
[80] Reza Nejabati,et al. Monitoring and physical-layer attack mitigation in SDN-controlled quantum key distribution networks , 2019, IEEE/OSA Journal of Optical Communications and Networking.
[81] An Braeken,et al. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.
[82] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[83] Yuanwei Liu,et al. Uplink NOMA in Large-Scale Systems: Coverage and Physical Layer Security , 2017, ArXiv.
[84] Rosario Giustolisi,et al. Threats to 5G Group-based Authentication , 2016, SECRYPT.
[85] Huijuan Lu,et al. Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives , 2017, IEEE Access.
[86] Liang Liu,et al. Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).
[87] Soon Myoung Chung,et al. A Survey on the Security of Hypervisors in Cloud Computing , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops.
[88] Ting Ma,et al. A Cross-layer Collaborative Handover Authentication Approach for 5G Heterogeneous Network , 2019 .
[89] Young-Gab Kim,et al. Analysis of IoT Platform Security: A Survey , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).
[90] Geza Sapi,et al. Online Privacy and Market Structure: Theory and Evidence , 2022, Information Economics and Policy.
[91] Roger Piqueras Jover,et al. The current state of affairs in 5G security and the main remaining security challenges , 2019, ArXiv.
[92] Edgar Weippl,et al. On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.
[93] Aditya Trivedi,et al. Physical Layer Security Approaches in 5G Wireless Communication Networks , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[94] Anand R. Prasad,et al. 3GPP 5G Security , 2018, J. ICT Stand..
[95] Zexian Li,et al. 5G micro-operator networks — A key enabler for new verticals and markets , 2017, 2017 25th Telecommunication Forum (TELFOR).
[96] Rajiv Ranjan,et al. Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.
[97] Adriano Valenzano,et al. Semiautomated Verification of Access Control Implementation in Industrial Networked Systems , 2015, IEEE Transactions on Industrial Informatics.
[98] Kai-Kit Wong,et al. Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers , 2019, IEEE Access.
[99] Christian Bonnet,et al. OpenAirInterface: A Flexible Platform for 5G Research , 2014, CCRV.
[100] Andrei Gurtov,et al. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks , 2019, IEEE Transactions on Smart Grid.
[101] Swades De,et al. Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users , 2016, IEEE Transactions on Information Forensics and Security.
[102] Elena Dubrova,et al. Protecting IMSI and User Privacy in 5G Networks , 2016, MobiMedia.
[103] PRADIP KUMAR SHARMA,et al. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.
[104] Laxmana Rao Battula. Network Security Function Virtualization(NSFV) towards Cloud computing with NFV Over Openflow infrastructure: Challenges and novel approaches , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[105] Ahmed Toumanari,et al. Survey of Security in Software-Defined Network , 2017 .
[106] Fan Wu,et al. Cross-Layer Scheduling for OFDMA-Based Cognitive Radio Systems With Delay and Security Constraints , 2015, IEEE Transactions on Vehicular Technology.
[107] Anna Brunstrom,et al. SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[108] Rong Yu,et al. Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.
[109] Yacine Challal,et al. Security in device-to-device communications: a survey , 2018, IET Networks.
[110] Dhruvi Mewada,et al. A Survey: Prospects of Internet of Things (IoT) Using Cryptography Based on its Subsequent Challenges , 2019 .
[111] Akhil Gupta,et al. Security Architecture of 5G Wireless Communication Network , 2018 .
[112] Andrei V. Gurtov,et al. NFV security considerations for cloud-based mobile virtual network operators , 2016, 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[113] Ralph Deters,et al. Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[114] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[115] Giuseppe Bianchi,et al. D-STREAMON - a NFV-capable distributed framework for network monitoring , 2016, ArXiv.
[116] Pekka Nikander,et al. Host Identity Protocol (HIP) Architecture , 2006, RFC.
[117] Halim Yanikomeroglu,et al. Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks , 2016, IEEE Transactions on Wireless Communications.
[118] Gan Zheng,et al. Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.
[119] David Blaauw,et al. Recryptor: A Reconfigurable Cryptographic Cortex-M0 Processor With In-Memory and Near-Memory Computing for IoT Security , 2018, IEEE Journal of Solid-State Circuits.
[120] Toni Janevski,et al. Quality Evaluation of Cloud and Fog Computing Services in 5G Networks , 2021, Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society.
[121] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[122] Mohammed Ismail,et al. Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[123] Wissam Mallouli,et al. Implementation of content poisoning attack detection and reaction in virtualized NDN networks , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[124] Mathieu Bouet,et al. Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).
[125] Wissam Mallouli,et al. An SDN and NFV Use Case: NDN Implementation and Security Monitoring , 2017, Guide to Security in SDN and NFV.
[126] Andrei V. Gurtov,et al. Secure communication channel architecture for Software Defined Mobile Networks , 2017, Comput. Networks.
[127] Khaled M. Rabie,et al. Physical Layer Security With RF Energy Harvesting in AF Multi-Antenna Relaying Networks , 2016, IEEE Transactions on Communications.
[128] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[129] Mika Ylianttila,et al. Software Defined Monitoring (SDM) for 5G mobile backhaul networks , 2017, 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).
[130] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[131] Wei Yang,et al. A survey on security in network functions virtualization , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).
[132] Lav R. Varshney,et al. Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.
[133] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[134] Furqan Jameel,et al. On secrecy performance of industrial Internet of things , 2018, Internet Technol. Lett..
[135] Seungae Kang,et al. Service platform and monitoring architecture for network function virtualization (NFV) , 2016, Cluster Computing.
[136] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[137] Willian D. de Mattos,et al. M-Health Solutions Using 5G Networks and M2M Communications , 2016, IT Professional.
[138] Jianfeng Ma,et al. A Secure Data Self-Destructing Scheme in Cloud Computing , 2014, IEEE Transactions on Cloud Computing.
[139] Wolfgang Kellerer,et al. An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement , 2017, IEEE Communications Magazine.
[140] Ehab Al-Shaer,et al. Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement , 2017, IEEE Transactions on Parallel and Distributed Systems.
[141] Hong Wen,et al. Physical layer authentication based on channel information and machine learning , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[142] Jari Arkko,et al. A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[143] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[144] Carlo Ghezzi,et al. Topology aware adaptive security , 2014, SEAMS 2014.
[145] Sumant Ku Mohapatra,et al. COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS , 2015 .
[146] Kahina Lazri,et al. Anomaly Detection and Root Cause Localization in Virtual Network Functions , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).
[147] Karan Verma,et al. Security for 5G , 2018 .
[148] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[149] Chao-Tung Yang,et al. The Implementation of Real-Time Network Traffic Monitoring Service with Network Functions Virtualization , 2015, 2015 International Conference on Cloud Computing and Big Data (CCBD).
[150] Kim-Kwang Raymond Choo,et al. Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.
[151] Muhammad Sohail,et al. A Robust Security Architecture for SDN-Based 5G Networks , 2019, Future Internet.
[152] Rocco De Nicola,et al. Blockchain-Based Decentralized Cloud/Fog Solutions: Challenges, Opportunities, and Standards , 2018, IEEE Communications Standards Magazine.
[153] Can Emre Koksal,et al. Physical-Layer Security in TDD Massive MIMO , 2018, IEEE Transactions on Information Theory.
[154] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[155] Stanislav Lange,et al. Evaluation of a Distributed Control Plane for Managing Heterogeneous SDN-enabled and Legacy Networks , 2018, 2018 IEEE Seventh International Conference on Communications and Electronics (ICCE).
[156] Fadi Al-Turjman,et al. 5G-enabled devices and smart-spaces in social-IoT: An overview , 2017, Future Gener. Comput. Syst..
[157] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[158] Jose M. Alcaraz Calero,et al. Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets , 2017, IEEE Internet Computing.
[159] Xuejun Sha,et al. On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.
[160] Jing Lei,et al. Physical-layer encryption in massive MIMO systems with spatial modulation , 2018, China Communications.
[161] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[162] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[163] Hlaing Minn,et al. Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.
[164] F. Richard Yu,et al. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.
[165] Junfeng Tian,et al. A Trusted VM Live Migration Protocol in IaaS , 2017 .
[166] Talal Alharbi,et al. Holistic DDoS mitigation using NFV , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[167] Henrik Lehrmann Christiansen,et al. Fronthaul for Cloud-RAN Enabling Network Slicing in 5G Mobile Networks , 2018, Wirel. Commun. Mob. Comput..
[168] Naveen K. Chilamkurti,et al. Survey on SDN based network intrusion detection system using machine learning approaches , 2018, Peer-to-Peer Networking and Applications.
[169] Jong Hyuk Park,et al. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.
[170] Rakesh Kumar Jha,et al. A survey on green communication and security challenges in 5G wireless communication networks , 2017, J. Netw. Comput. Appl..
[171] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[172] Ruixuan Li,et al. Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud , 2014, IEEE Transactions on Cloud Computing.
[173] Garima Chopra,et al. A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..
[174] Marja Matinmikko-Blue,et al. Micro-Operator driven Local 5G Network Architecture for Industrial Internet , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[175] Jemal H. Abawajy,et al. Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.
[176] Saeedeh Parsaeefard,et al. Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.
[177] Rizwan Ahmed,et al. Comprehensive Survey of Key Technologies Enabling 5G-IoT , 2019 .
[178] Zhu Han,et al. Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[179] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[180] Nan Zhang,et al. Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture , 2015 .
[181] Shan-Hsiang Shen. An Efficient Network Monitor for SDN Networks , 2019, PERV.
[182] Noël Crespi,et al. Securing authentication for mobile networks, a survey on 4G issues and 5G answers , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[183] Aboubaker Lasebae,et al. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).
[184] Mahesh K. Marina,et al. Network Slicing in 5G: Survey and Challenges , 2017, IEEE Communications Magazine.
[185] Bin Han,et al. Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.
[186] Dushantha Nalin K. Jayakody,et al. Recent Advances and Future Research Challenges in Non-Orthogonal Multiple Access for 5G Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[187] D. Martin Swany,et al. Research challenges in future multi-domain network performance measurement and monitoring , 2015, CCRV.
[188] Ahmed Serhrouchni,et al. A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[189] Daniel Schmidt,et al. The world in 2025 - predictions for the next ten years , 2015, 2015 10th International Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT).
[190] Chengwen Xing,et al. Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.
[191] Yang Yixian,et al. Improving security and efciency for encrypted data sharing in online social networks , 2014, China Communications.
[192] Yixian Yang,et al. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.
[193] Seth Flaxman,et al. European Union Regulations on Algorithmic Decision-Making and a "Right to Explanation" , 2016, AI Mag..
[194] Kai-Kit Wong,et al. Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[195] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[196] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[197] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[198] Shunliang Zhang,et al. An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.
[199] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[200] Zhang Lei,et al. Security Analysis of Control Plane in ASON , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[201] Vishal Sharma,et al. A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks , 2019, 5G Enabled Secure Wireless Networks.
[202] Arumugam Nallanathan,et al. Wireless Information and Power Transfer: A New Green Communications Paradigm , 2017 .
[203] Jun Li,et al. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges , 2018, IEEE Communications Surveys & Tutorials.
[204] Chu-Sing Yang,et al. Network Monitoring in Software-Defined Networking: A Review , 2018, IEEE Systems Journal.
[205] 5 G security – Package 3 : Mobile Edge Computing / Low Latency / Consistent User Experience , 2018 .
[206] H. Vincent Poor,et al. Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[207] Bin Han,et al. Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability , 2019, IEEE Access.
[208] Mouna Jouini,et al. Security Problems in Cloud Computing Environments: A Deep Analysis and a Secure Framework , 2017 .
[209] S. K. Patel,et al. 5G technology of mobile communication: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[210] Jin Li,et al. Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.
[211] Nirwan Ansari,et al. A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[212] Rafal Wojtczuk. Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors , 2014 .
[213] Kostas Berberidis,et al. Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.
[214] Andrei V. Gurtov,et al. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.
[215] Lynda L. McGhie,et al. THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .
[216] Akashkumar Rajaram,et al. Novel SWIPT Schemes for 5G Wireless Networks , 2019, Sensors.
[217] N. Pokrovskaia,et al. Tax, financial and social regulatory mechanisms within the knowledge-driven economy. Blockchain algorithms and fog computing for the efficient regulation , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).
[218] Noureddine Zahid,et al. Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA , 2012, The First International Conference on Future Generation Communication Technologies.
[219] Wen-Qin Wang,et al. Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach , 2018, IEEE Transactions on Information Forensics and Security.
[220] Dusit Niyato,et al. Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.
[221] Mohsen Guizani,et al. Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.
[222] Ted Taekyoung Kwon,et al. 5G K-SimNet: End-to-End Performance Evaluation of 5G Cellular Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[223] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[224] Vuk Marojevic,et al. Security and Protocol Exploit Analysis of the 5G Specifications , 2018, IEEE Access.
[225] Miao Pan,et al. Energy Efficient Resource Allocation for Secure NOMA Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[226] Saman Sarraf. 5G Emerging Technology and Affected Industries: Quick Survey , 2019 .
[227] Christoph Hanser,et al. Security in Mobile Telephony : The Security Levels in the Different Handy Generations , 2005 .
[228] Olivier Festor,et al. Towards a security monitoring plane for named data networking and its application against content poisoning attack , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[229] Rafael F. Schaefer,et al. Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping , 2018, IEEE Transactions on Cognitive Communications and Networking.
[230] Elisa Bertino,et al. Insecure connection bootstrapping in cellular networks: the root of all evil , 2019, WiSec.
[231] Li Sun,et al. Physical layer security with its applications in 5G networks: A review , 2017, China Communications.
[232] Nitesh Saxena,et al. On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[233] Andrei Gurtov,et al. Leveraging LTE security with SDN and NFV , 2015, 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS).
[234] Petri Ahokangas,et al. Future micro operators business models in 5 G , 2016 .
[235] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[236] Daniel Zahavi,et al. The Secrecy Capacity of Gaussian MIMO Channels With Finite Memory , 2017, IEEE Transactions on Information Theory.
[237] Zhu Han,et al. Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.
[238] Liang Zhong,et al. Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels , 2016, IEEE Transactions on Information Forensics and Security.
[239] Christian Wietfeld,et al. PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks , 2016, IEEE Transactions on Wireless Communications.
[240] Andrei Gurtov,et al. IP-Based Virtual Private Network Implementations in Future Cellular Networks , 2014 .
[241] Francis Minhthang Bui,et al. Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.
[242] Andrei Gurtov,et al. A Case Study on Security Issues in LTE Backhaul and Core Networks , 2014 .
[243] Yuansong Qiao,et al. Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.
[244] Hai Lin,et al. Robust Beamforming for Physical Layer Security in BDMA Massive MIMO , 2017, IEEE Journal on Selected Areas in Communications.
[245] K SudeendraKumar,et al. Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).
[246] Adrien Koutsos,et al. The 5G-AKA Authentication Protocol Privacy , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[247] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[248] Mykola Brych,et al. An IoT based monitoring framework for software defined 5G mobile networks , 2017, IMCOM.
[249] Narendra S. Chaudhari,et al. Security Vulnerabilities in Handover Authentication Mechanism of 5G Network , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[250] Wei Zhang,et al. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[251] Young-Gab Kim,et al. Development of IoT security component for interoperability , 2017, 2017 13th International Computer Engineering Conference (ICENCO).
[252] Muhammad Ali Imran,et al. 5G Backhaul Challenges and Emerging Research Directions: A Survey , 2016, IEEE Access.
[253] Michael K. Reiter,et al. Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu , 2017, AsiaCCS.
[254] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[255] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[256] Jorge Maestre Vidal,et al. Traffic-flow analysis for source-side DDoS recognition on 5G environments , 2019, J. Netw. Comput. Appl..
[257] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[258] Thomas Magedanz,et al. VISECO: An Annotated Security Management Framework for 5G , 2018, MSPN.
[259] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[260] Tooska Dargahi,et al. A Survey on the Security of Stateful SDN Data Planes , 2017, IEEE Communications Surveys & Tutorials.
[261] Georges Kaddoum,et al. On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.
[262] Zhi Chen,et al. Energy-efficient trajectory planning for UAV-aided secure communication , 2018, China Communications.
[263] Jung-Soo Park,et al. A Survey on Interfaces to Network Security Functions in Network Virtualization , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[264] James Zhang,et al. Anomaly detection in wide area network meshes using two machine learning algorithms , 2019, Future Gener. Comput. Syst..
[265] Md. Mamun-Or-Rashid,et al. Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future Direction , 2019, 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE).
[266] Hui Guo,et al. Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.
[267] Jeong Hyun Yi,et al. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.
[268] Nirwan Ansari,et al. Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.
[269] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[270] Ashutosh Singandhupe,et al. Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal , 2018, IEEE Access.
[271] Shubo Liu,et al. A Differentially Private Unscented Kalman Filter for Streaming Data in IoT , 2018, IEEE Access.
[272] Bernd Jäger,et al. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[273] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[274] Naimah Yaakob,et al. Effective and efficient network anomaly detection system using machine learning algorithm , 2019, Bulletin of Electrical Engineering and Informatics.
[275] Rajeev Anand Sahu,et al. Public-Key Encryption with Integrated Keyword Search , 2019, Journal of Hardware and Systems Security.
[276] Arun Kumar Sangaiah,et al. A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing , 2018, IEEE Access.
[277] Weihua Zhuang,et al. User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks , 2018, IEEE Transactions on Vehicular Technology.
[278] Cataldo Basile,et al. A novel approach for integrating security policy enforcement with dynamic network virtualization , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).
[279] Gianclaudio Malgieri,et al. The right to data portability in the GDPR: Towards user-centric interoperability of digital services , 2017, Comput. Law Secur. Rev..
[280] Tareq Y. Al-Naffouri,et al. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.
[281] Madhusanka Liyanage,et al. Software Defined Security Monitoring in 5G Networks , 2019 .
[282] Sachin Shetty,et al. ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[283] Samiran Chattopadhyay,et al. On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.
[284] Halim Yanikomeroglu,et al. Secure Communication in OFDMA-Based Cognitive Radio Networks: An Incentivized Secondary Network Coexistence Approach , 2017, IEEE Transactions on Vehicular Technology.
[285] Félix J. García Clemente,et al. Automatic monitoring management for 5G mobile networks , 2017, FNC/MobiSPC.
[286] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[287] Inkyu Lee,et al. UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.
[288] Quanzhong Li,et al. Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information , 2018, IEEE Transactions on Information Forensics and Security.
[289] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[290] Qi Shi,et al. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[291] Ping Zhang,et al. A survey of testing for 5G: Solutions, opportunities, and challenges , 2019, China Communications.
[292] G. A. Chukwudebe,et al. Requirement analysis of IoT security in distributed systems , 2017, 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON).
[293] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[294] Jani Suomalainen,et al. Towards Micro-Segmentation in 5G Network Security , 2016 .
[295] Ming Lim,et al. An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems , 2018, China Communications.
[296] Raimo Kantola,et al. Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.
[297] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[298] Maode Ma,et al. Secure and Efficient Vertical Handover Authentication for 5G HetNets , 2018, 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP).
[299] Igor Faynberg,et al. NFV Security: Emerging Technologies and Standards , 2017, Guide to Security in SDN and NFV.
[300] Huiming Wang,et al. Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[301] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[302] Ahmed Meddahi,et al. A First Step Towards Security Extension for NFV Orchestrator , 2017, SDN-NFV@CODASPY.
[303] Dianxiang Xu,et al. Security of Software Defined Networks: A survey , 2015, Comput. Secur..
[304] Hlaing Minn,et al. Artificial Noise Aided Hybrid Precoding Design for Secure mmWave MISO Systems With Partial Channel Knowledge , 2017, IEEE Signal Processing Letters.
[305] Ahmed Meddahi,et al. SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[306] Bo Ai,et al. Physical Layer Security Over Fluctuating Two-Ray Fading Channels , 2018, IEEE Transactions on Vehicular Technology.
[307] Mohammad Abdullah Al Faruque,et al. Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[308] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[309] Talal Alharbi,et al. Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[310] F. Richard Yu,et al. Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.
[311] Sasu Tarkoma,et al. Software defined networking for security enhancement in wireless mobile networks , 2014, Comput. Networks.
[312] Chao Li,et al. Privacy in Internet of Things: From Principles to Technologies , 2018, IEEE Internet of Things Journal.
[313] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.
[314] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[315] Mimoza Durresi,et al. Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).
[316] Young B. Moon,et al. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.
[317] Xiqi Gao,et al. Beam Domain Secure Transmission for Massive MIMO Communications , 2018, IEEE Transactions on Vehicular Technology.
[318] Mamta Agiwal,et al. Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .
[319] Ahmed Meddahi,et al. NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.
[320] Yustus Eko Oktian,et al. Securing distributed SDN with IBC , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.
[321] Valtteri Niemi,et al. Defeating the Downgrade Attack on Identity Privacy in 5G , 2018, SSR.
[322] Ravishankar Borgaonkar,et al. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..
[323] Tanesh Kumar,et al. 5G Privacy: Scenarios and Solutions , 2018, 2018 IEEE 5G World Forum (5GWF).
[324] Hui-Ming Wang,et al. MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback , 2018, IEEE Transactions on Vehicular Technology.
[325] Paul F Scott. Secrecy and surveillance: lessons from the law of IMSI catchers , 2019, International Review of Law, Computers & Technology.