A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.

[1]  Steve Gold The rebirth of phreaking , 2011, Netw. Secur..

[2]  AKHIL GUPTA,et al.  A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.

[3]  Zhenyu Wen,et al.  Cost Effective, Reliable, and Secure Workflow Deployment over Federated Clouds , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[4]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[5]  Martin Reisslein,et al.  Transport SDN at the dawn of the 5G era , 2019, Opt. Switch. Netw..

[6]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[7]  M. Shamim Hossain,et al.  Towards a Secure Mobile Edge Computing Framework for Hajj , 2017, IEEE Access.

[8]  Pawani Porambage,et al.  Securing Gadget-Free Digital Services , 2018, Computer.

[9]  Tamma Bheemarjuna Reddy,et al.  Software Defined Wireless Networks: A Survey of Issues and Solutions , 2017, Wireless Personal Communications.

[10]  Andrei V. Gurtov,et al.  New concepts for traffic, resource and mobility management in software-defined mobile networks , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[11]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[12]  Liang Jin,et al.  Artificial noise aided polar codes for physical layer security , 2017, China Communications.

[13]  Peter A. Hamilton,et al.  Data Protection in OpenStack , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[14]  Joonsang Baek,et al.  A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.

[15]  Yueming Cai,et al.  Physical layer security of non-orthogonal multiple access in cognitive radio networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[16]  Dharma P. Agrawal,et al.  5G mobile technology: A survey , 2015, ICT Express.

[17]  Seungjoon Lee,et al.  Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.

[18]  Inge Graef,et al.  Mandating portability and interoperability in online social networks , 2015 .

[19]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[20]  Tao Wan,et al.  Comparative Analysis of Control Plane Security of SDN and Conventional Networks , 2017, IEEE Communications Surveys & Tutorials.

[21]  Jin Zhang,et al.  MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Hui-Ming Wang,et al.  Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.

[23]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[24]  Ma,et al.  Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks , 2014 .

[25]  Hannes Tschofenig,et al.  Authentication and Authorization for Constrained Environments (ACE) , 2017 .

[26]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[27]  Mark F. Flanagan,et al.  Secure communication for separated and integrated receiver architectures in SWIPT , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[28]  Wen-Qin Wang,et al.  Hybrid MIMO and Phased-Array Directional Modulation for Physical Layer Security in mmWave Wireless Communications , 2018, IEEE Journal on Selected Areas in Communications.

[29]  Shubhranshu Singh,et al.  5G service requirements and operational use cases: Analysis and METIS II vision , 2016, 2016 European Conference on Networks and Communications (EuCNC).

[30]  Mohsen Guizani,et al.  Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.

[31]  Hyoungshick Kim,et al.  Security challenges with network functions virtualization , 2017, Future Gener. Comput. Syst..

[32]  Roberto Baldoni,et al.  Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.

[33]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[34]  Thar Baker,et al.  The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey , 2019, Sensors.

[35]  Wenjuan Li,et al.  A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..

[36]  Hsiao-Hwa Chen,et al.  Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Andrei V. Gurtov,et al.  Secured VPN Models for LTE Backhaul Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[38]  Zhiyong Xu,et al.  A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[39]  C. Emre Koksal,et al.  Physical Layer Security in Massive MIMO , 2015, 1505.00396.

[40]  Taekyoung Kwon,et al.  Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.

[41]  Kathiravan Srinivasan,et al.  5G Security: Concepts and Challenges , 2019 .

[42]  Karl Andersson,et al.  Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey , 2019, IEEE Access.

[43]  Georgios Xilouris,et al.  An integrating framework for efficient NFV monitoring , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[44]  Mohan Kumar,et al.  S-NFV: Securing NFV states by using SGX , 2016, SDN-NFV@CODASPY.

[45]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[46]  Andrei Gurtov,et al.  A Comprehensive Guide to 5G Security , 2018 .

[47]  Sven Dietrich,et al.  Security Challenges and Opportunities of Software-Defined Networking , 2017, IEEE Security & Privacy.

[48]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[49]  Westley Weimer,et al.  Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage , 2017, RAID.

[50]  Ingrid Moerman,et al.  Recent Advances in 5G Technologies: New Radio Access and Networking , 2019, Wireless Communications and Mobile Computing.

[51]  Joseph K. Liu,et al.  Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control , 2017, Future Gener. Comput. Syst..

[52]  Kahina Lazri,et al.  Towards Black-Box Anomaly Detection in Virtual Network Functions , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).

[53]  Min Chen,et al.  Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.

[54]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[55]  Cas J. F. Cremers,et al.  Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion , 2019, NDSS.

[56]  S. Rama Krishna,et al.  Virtualization Security Issues and Mitigations in Cloud Computing , 2017 .

[57]  Bo Ai,et al.  Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.

[58]  Robert W. Heath,et al.  Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.

[59]  Stenio F. L. Fernandes,et al.  Integrated NFV/SDN Architectures , 2018, ArXiv.

[60]  Philipp Winter,et al.  The Impact of User Location on Cookie Notices (Inside and Outside of the European Union) , 2019 .

[61]  Victor I. Chang,et al.  Location and trajectory privacy preservation in 5G-Enabled vehicle social network services , 2018, J. Netw. Comput. Appl..

[62]  Sébastien Ziegler,et al.  The Impact of the European General Data Protection Regulation (GDPR) on Future Data Business Models: Toward a New Paradigm and Business Opportunities , 2018, Digital Business Models.

[63]  Yun Liu,et al.  Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.

[64]  Andrei V. Gurtov,et al.  Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[65]  Salim Hariri,et al.  IoT Security Framework for Smart Water System , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).

[66]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[67]  Tarik Taleb,et al.  NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.

[68]  Masayuki Murata,et al.  QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks , 2017, IEEE Access.

[69]  Zheng Yan,et al.  Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.

[70]  S. Aaronson,et al.  Data is Different: Why the World Needs a New Approach to Governing Cross-Border Data Flows , 2018 .

[71]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[72]  Ninghui Li,et al.  Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.

[73]  Rahim Tafazolli,et al.  Modulation Based Non-Orthogonal Multiple Access for 5G Resilient Networks , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[74]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[75]  Martin Knahl,et al.  Software Defined Privacy , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[76]  Fuad E. Alsaadi,et al.  Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks , 2017 .

[77]  Jianhua Ge,et al.  Graph Theory Based Cooperative Transmission for Physical-Layer Security in 5G Large-Scale Wireless Relay Networks , 2017, IEEE Access.

[78]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[79]  Mingkai Chen,et al.  Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.

[80]  Reza Nejabati,et al.  Monitoring and physical-layer attack mitigation in SDN-controlled quantum key distribution networks , 2019, IEEE/OSA Journal of Optical Communications and Networking.

[81]  An Braeken,et al.  Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.

[82]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[83]  Yuanwei Liu,et al.  Uplink NOMA in Large-Scale Systems: Coverage and Physical Layer Security , 2017, ArXiv.

[84]  Rosario Giustolisi,et al.  Threats to 5G Group-based Authentication , 2016, SECRYPT.

[85]  Huijuan Lu,et al.  Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives , 2017, IEEE Access.

[86]  Liang Liu,et al.  Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).

[87]  Soon Myoung Chung,et al.  A Survey on the Security of Hypervisors in Cloud Computing , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops.

[88]  Ting Ma,et al.  A Cross-layer Collaborative Handover Authentication Approach for 5G Heterogeneous Network , 2019 .

[89]  Young-Gab Kim,et al.  Analysis of IoT Platform Security: A Survey , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).

[90]  Geza Sapi,et al.  Online Privacy and Market Structure: Theory and Evidence , 2022, Information Economics and Policy.

[91]  Roger Piqueras Jover,et al.  The current state of affairs in 5G security and the main remaining security challenges , 2019, ArXiv.

[92]  Edgar Weippl,et al.  On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.

[93]  Aditya Trivedi,et al.  Physical Layer Security Approaches in 5G Wireless Communication Networks , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[94]  Anand R. Prasad,et al.  3GPP 5G Security , 2018, J. ICT Stand..

[95]  Zexian Li,et al.  5G micro-operator networks — A key enabler for new verticals and markets , 2017, 2017 25th Telecommunication Forum (TELFOR).

[96]  Rajiv Ranjan,et al.  Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.

[97]  Adriano Valenzano,et al.  Semiautomated Verification of Access Control Implementation in Industrial Networked Systems , 2015, IEEE Transactions on Industrial Informatics.

[98]  Kai-Kit Wong,et al.  Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers , 2019, IEEE Access.

[99]  Christian Bonnet,et al.  OpenAirInterface: A Flexible Platform for 5G Research , 2014, CCRV.

[100]  Andrei Gurtov,et al.  Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks , 2019, IEEE Transactions on Smart Grid.

[101]  Swades De,et al.  Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users , 2016, IEEE Transactions on Information Forensics and Security.

[102]  Elena Dubrova,et al.  Protecting IMSI and User Privacy in 5G Networks , 2016, MobiMedia.

[103]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[104]  Laxmana Rao Battula Network Security Function Virtualization(NSFV) towards Cloud computing with NFV Over Openflow infrastructure: Challenges and novel approaches , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[105]  Ahmed Toumanari,et al.  Survey of Security in Software-Defined Network , 2017 .

[106]  Fan Wu,et al.  Cross-Layer Scheduling for OFDMA-Based Cognitive Radio Systems With Delay and Security Constraints , 2015, IEEE Transactions on Vehicular Technology.

[107]  Anna Brunstrom,et al.  SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[108]  Rong Yu,et al.  Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.

[109]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[110]  Dhruvi Mewada,et al.  A Survey: Prospects of Internet of Things (IoT) Using Cryptography Based on its Subsequent Challenges , 2019 .

[111]  Akhil Gupta,et al.  Security Architecture of 5G Wireless Communication Network , 2018 .

[112]  Andrei V. Gurtov,et al.  NFV security considerations for cloud-based mobile virtual network operators , 2016, 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[113]  Ralph Deters,et al.  Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[114]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[115]  Giuseppe Bianchi,et al.  D-STREAMON - a NFV-capable distributed framework for network monitoring , 2016, ArXiv.

[116]  Pekka Nikander,et al.  Host Identity Protocol (HIP) Architecture , 2006, RFC.

[117]  Halim Yanikomeroglu,et al.  Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks , 2016, IEEE Transactions on Wireless Communications.

[118]  Gan Zheng,et al.  Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.

[119]  David Blaauw,et al.  Recryptor: A Reconfigurable Cryptographic Cortex-M0 Processor With In-Memory and Near-Memory Computing for IoT Security , 2018, IEEE Journal of Solid-State Circuits.

[120]  Toni Janevski,et al.  Quality Evaluation of Cloud and Fog Computing Services in 5G Networks , 2021, Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society.

[121]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[122]  Mohammed Ismail,et al.  Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[123]  Wissam Mallouli,et al.  Implementation of content poisoning attack detection and reaction in virtualized NDN networks , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).

[124]  Mathieu Bouet,et al.  Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[125]  Wissam Mallouli,et al.  An SDN and NFV Use Case: NDN Implementation and Security Monitoring , 2017, Guide to Security in SDN and NFV.

[126]  Andrei V. Gurtov,et al.  Secure communication channel architecture for Software Defined Mobile Networks , 2017, Comput. Networks.

[127]  Khaled M. Rabie,et al.  Physical Layer Security With RF Energy Harvesting in AF Multi-Antenna Relaying Networks , 2016, IEEE Transactions on Communications.

[128]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[129]  Mika Ylianttila,et al.  Software Defined Monitoring (SDM) for 5G mobile backhaul networks , 2017, 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).

[130]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[131]  Wei Yang,et al.  A survey on security in network functions virtualization , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[132]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[133]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[134]  Furqan Jameel,et al.  On secrecy performance of industrial Internet of things , 2018, Internet Technol. Lett..

[135]  Seungae Kang,et al.  Service platform and monitoring architecture for network function virtualization (NFV) , 2016, Cluster Computing.

[136]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[137]  Willian D. de Mattos,et al.  M-Health Solutions Using 5G Networks and M2M Communications , 2016, IT Professional.

[138]  Jianfeng Ma,et al.  A Secure Data Self-Destructing Scheme in Cloud Computing , 2014, IEEE Transactions on Cloud Computing.

[139]  Wolfgang Kellerer,et al.  An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement , 2017, IEEE Communications Magazine.

[140]  Ehab Al-Shaer,et al.  Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement , 2017, IEEE Transactions on Parallel and Distributed Systems.

[141]  Hong Wen,et al.  Physical layer authentication based on channel information and machine learning , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[142]  Jari Arkko,et al.  A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[143]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[144]  Carlo Ghezzi,et al.  Topology aware adaptive security , 2014, SEAMS 2014.

[145]  Sumant Ku Mohapatra,et al.  COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS , 2015 .

[146]  Kahina Lazri,et al.  Anomaly Detection and Root Cause Localization in Virtual Network Functions , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).

[147]  Karan Verma,et al.  Security for 5G , 2018 .

[148]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[149]  Chao-Tung Yang,et al.  The Implementation of Real-Time Network Traffic Monitoring Service with Network Functions Virtualization , 2015, 2015 International Conference on Cloud Computing and Big Data (CCBD).

[150]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[151]  Muhammad Sohail,et al.  A Robust Security Architecture for SDN-Based 5G Networks , 2019, Future Internet.

[152]  Rocco De Nicola,et al.  Blockchain-Based Decentralized Cloud/Fog Solutions: Challenges, Opportunities, and Standards , 2018, IEEE Communications Standards Magazine.

[153]  Can Emre Koksal,et al.  Physical-Layer Security in TDD Massive MIMO , 2018, IEEE Transactions on Information Theory.

[154]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[155]  Stanislav Lange,et al.  Evaluation of a Distributed Control Plane for Managing Heterogeneous SDN-enabled and Legacy Networks , 2018, 2018 IEEE Seventh International Conference on Communications and Electronics (ICCE).

[156]  Fadi Al-Turjman,et al.  5G-enabled devices and smart-spaces in social-IoT: An overview , 2017, Future Gener. Comput. Syst..

[157]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[158]  Jose M. Alcaraz Calero,et al.  Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets , 2017, IEEE Internet Computing.

[159]  Xuejun Sha,et al.  On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.

[160]  Jing Lei,et al.  Physical-layer encryption in massive MIMO systems with spatial modulation , 2018, China Communications.

[161]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[162]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[163]  Hlaing Minn,et al.  Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.

[164]  F. Richard Yu,et al.  Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.

[165]  Junfeng Tian,et al.  A Trusted VM Live Migration Protocol in IaaS , 2017 .

[166]  Talal Alharbi,et al.  Holistic DDoS mitigation using NFV , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[167]  Henrik Lehrmann Christiansen,et al.  Fronthaul for Cloud-RAN Enabling Network Slicing in 5G Mobile Networks , 2018, Wirel. Commun. Mob. Comput..

[168]  Naveen K. Chilamkurti,et al.  Survey on SDN based network intrusion detection system using machine learning approaches , 2018, Peer-to-Peer Networking and Applications.

[169]  Jong Hyuk Park,et al.  Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.

[170]  Rakesh Kumar Jha,et al.  A survey on green communication and security challenges in 5G wireless communication networks , 2017, J. Netw. Comput. Appl..

[171]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[172]  Ruixuan Li,et al.  Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud , 2014, IEEE Transactions on Cloud Computing.

[173]  Garima Chopra,et al.  A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..

[174]  Marja Matinmikko-Blue,et al.  Micro-Operator driven Local 5G Network Architecture for Industrial Internet , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[175]  Jemal H. Abawajy,et al.  Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.

[176]  Saeedeh Parsaeefard,et al.  Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.

[177]  Rizwan Ahmed,et al.  Comprehensive Survey of Key Technologies Enabling 5G-IoT , 2019 .

[178]  Zhu Han,et al.  Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[179]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[180]  Nan Zhang,et al.  Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture , 2015 .

[181]  Shan-Hsiang Shen An Efficient Network Monitor for SDN Networks , 2019, PERV.

[182]  Noël Crespi,et al.  Securing authentication for mobile networks, a survey on 4G issues and 5G answers , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).

[183]  Aboubaker Lasebae,et al.  An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).

[184]  Mahesh K. Marina,et al.  Network Slicing in 5G: Survey and Challenges , 2017, IEEE Communications Magazine.

[185]  Bin Han,et al.  Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.

[186]  Dushantha Nalin K. Jayakody,et al.  Recent Advances and Future Research Challenges in Non-Orthogonal Multiple Access for 5G Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[187]  D. Martin Swany,et al.  Research challenges in future multi-domain network performance measurement and monitoring , 2015, CCRV.

[188]  Ahmed Serhrouchni,et al.  A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[189]  Daniel Schmidt,et al.  The world in 2025 - predictions for the next ten years , 2015, 2015 10th International Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT).

[190]  Chengwen Xing,et al.  Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.

[191]  Yang Yixian,et al.  Improving security and efciency for encrypted data sharing in online social networks , 2014, China Communications.

[192]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[193]  Seth Flaxman,et al.  European Union Regulations on Algorithmic Decision-Making and a "Right to Explanation" , 2016, AI Mag..

[194]  Kai-Kit Wong,et al.  Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[195]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[196]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[197]  Ralf Sasse,et al.  A Formal Analysis of 5G Authentication , 2018, CCS.

[198]  Shunliang Zhang,et al.  An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.

[199]  WADOOD ABDUL,et al.  Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.

[200]  Zhang Lei,et al.  Security Analysis of Control Plane in ASON , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[201]  Vishal Sharma,et al.  A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks , 2019, 5G Enabled Secure Wireless Networks.

[202]  Arumugam Nallanathan,et al.  Wireless Information and Power Transfer: A New Green Communications Paradigm , 2017 .

[203]  Jun Li,et al.  Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges , 2018, IEEE Communications Surveys & Tutorials.

[204]  Chu-Sing Yang,et al.  Network Monitoring in Software-Defined Networking: A Review , 2018, IEEE Systems Journal.

[205]  5 G security – Package 3 : Mobile Edge Computing / Low Latency / Consistent User Experience , 2018 .

[206]  H. Vincent Poor,et al.  Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[207]  Bin Han,et al.  Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability , 2019, IEEE Access.

[208]  Mouna Jouini,et al.  Security Problems in Cloud Computing Environments: A Deep Analysis and a Secure Framework , 2017 .

[209]  S. K. Patel,et al.  5G technology of mobile communication: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[210]  Jin Li,et al.  Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.

[211]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[212]  Rafal Wojtczuk Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors , 2014 .

[213]  Kostas Berberidis,et al.  Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.

[214]  Andrei V. Gurtov,et al.  Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.

[215]  Lynda L. McGhie,et al.  THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .

[216]  Akashkumar Rajaram,et al.  Novel SWIPT Schemes for 5G Wireless Networks , 2019, Sensors.

[217]  N. Pokrovskaia,et al.  Tax, financial and social regulatory mechanisms within the knowledge-driven economy. Blockchain algorithms and fog computing for the efficient regulation , 2017, 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM).

[218]  Noureddine Zahid,et al.  Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA , 2012, The First International Conference on Future Generation Communication Technologies.

[219]  Wen-Qin Wang,et al.  Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach , 2018, IEEE Transactions on Information Forensics and Security.

[220]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[221]  Mohsen Guizani,et al.  Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[222]  Ted Taekyoung Kwon,et al.  5G K-SimNet: End-to-End Performance Evaluation of 5G Cellular Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[223]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[224]  Vuk Marojevic,et al.  Security and Protocol Exploit Analysis of the 5G Specifications , 2018, IEEE Access.

[225]  Miao Pan,et al.  Energy Efficient Resource Allocation for Secure NOMA Networks , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[226]  Saman Sarraf 5G Emerging Technology and Affected Industries: Quick Survey , 2019 .

[227]  Christoph Hanser,et al.  Security in Mobile Telephony : The Security Levels in the Different Handy Generations , 2005 .

[228]  Olivier Festor,et al.  Towards a security monitoring plane for named data networking and its application against content poisoning attack , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[229]  Rafael F. Schaefer,et al.  Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping , 2018, IEEE Transactions on Cognitive Communications and Networking.

[230]  Elisa Bertino,et al.  Insecure connection bootstrapping in cellular networks: the root of all evil , 2019, WiSec.

[231]  Li Sun,et al.  Physical layer security with its applications in 5G networks: A review , 2017, China Communications.

[232]  Nitesh Saxena,et al.  On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[233]  Andrei Gurtov,et al.  Leveraging LTE security with SDN and NFV , 2015, 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS).

[234]  Petri Ahokangas,et al.  Future micro operators business models in 5 G , 2016 .

[235]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[236]  Daniel Zahavi,et al.  The Secrecy Capacity of Gaussian MIMO Channels With Finite Memory , 2017, IEEE Transactions on Information Theory.

[237]  Zhu Han,et al.  Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.

[238]  Liang Zhong,et al.  Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels , 2016, IEEE Transactions on Information Forensics and Security.

[239]  Christian Wietfeld,et al.  PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks , 2016, IEEE Transactions on Wireless Communications.

[240]  Andrei Gurtov,et al.  IP-Based Virtual Private Network Implementations in Future Cellular Networks , 2014 .

[241]  Francis Minhthang Bui,et al.  Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.

[242]  Andrei Gurtov,et al.  A Case Study on Security Issues in LTE Backhaul and Core Networks , 2014 .

[243]  Yuansong Qiao,et al.  Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.

[244]  Hai Lin,et al.  Robust Beamforming for Physical Layer Security in BDMA Massive MIMO , 2017, IEEE Journal on Selected Areas in Communications.

[245]  K SudeendraKumar,et al.  Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).

[246]  Adrien Koutsos,et al.  The 5G-AKA Authentication Protocol Privacy , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[247]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[248]  Mykola Brych,et al.  An IoT based monitoring framework for software defined 5G mobile networks , 2017, IMCOM.

[249]  Narendra S. Chaudhari,et al.  Security Vulnerabilities in Handover Authentication Mechanism of 5G Network , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[250]  Wei Zhang,et al.  Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.

[251]  Young-Gab Kim,et al.  Development of IoT security component for interoperability , 2017, 2017 13th International Computer Engineering Conference (ICENCO).

[252]  Muhammad Ali Imran,et al.  5G Backhaul Challenges and Emerging Research Directions: A Survey , 2016, IEEE Access.

[253]  Michael K. Reiter,et al.  Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu , 2017, AsiaCCS.

[254]  Sakir Sezer,et al.  Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[255]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[256]  Jorge Maestre Vidal,et al.  Traffic-flow analysis for source-side DDoS recognition on 5G environments , 2019, J. Netw. Comput. Appl..

[257]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[258]  Thomas Magedanz,et al.  VISECO: An Annotated Security Management Framework for 5G , 2018, MSPN.

[259]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[260]  Tooska Dargahi,et al.  A Survey on the Security of Stateful SDN Data Planes , 2017, IEEE Communications Surveys & Tutorials.

[261]  Georges Kaddoum,et al.  On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.

[262]  Zhi Chen,et al.  Energy-efficient trajectory planning for UAV-aided secure communication , 2018, China Communications.

[263]  Jung-Soo Park,et al.  A Survey on Interfaces to Network Security Functions in Network Virtualization , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[264]  James Zhang,et al.  Anomaly detection in wide area network meshes using two machine learning algorithms , 2019, Future Gener. Comput. Syst..

[265]  Md. Mamun-Or-Rashid,et al.  Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future Direction , 2019, 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE).

[266]  Hui Guo,et al.  Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.

[267]  Jeong Hyun Yi,et al.  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[268]  Nirwan Ansari,et al.  Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.

[269]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[270]  Ashutosh Singandhupe,et al.  Reliable Security Algorithm for Drones Using Individual Characteristics From an EEG Signal , 2018, IEEE Access.

[271]  Shubo Liu,et al.  A Differentially Private Unscented Kalman Filter for Streaming Data in IoT , 2018, IEEE Access.

[272]  Bernd Jäger,et al.  Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[273]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[274]  Naimah Yaakob,et al.  Effective and efficient network anomaly detection system using machine learning algorithm , 2019, Bulletin of Electrical Engineering and Informatics.

[275]  Rajeev Anand Sahu,et al.  Public-Key Encryption with Integrated Keyword Search , 2019, Journal of Hardware and Systems Security.

[276]  Arun Kumar Sangaiah,et al.  A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing , 2018, IEEE Access.

[277]  Weihua Zhuang,et al.  User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks , 2018, IEEE Transactions on Vehicular Technology.

[278]  Cataldo Basile,et al.  A novel approach for integrating security policy enforcement with dynamic network virtualization , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).

[279]  Gianclaudio Malgieri,et al.  The right to data portability in the GDPR: Towards user-centric interoperability of digital services , 2017, Comput. Law Secur. Rev..

[280]  Tareq Y. Al-Naffouri,et al.  Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.

[281]  Madhusanka Liyanage,et al.  Software Defined Security Monitoring in 5G Networks , 2019 .

[282]  Sachin Shetty,et al.  ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[283]  Samiran Chattopadhyay,et al.  On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.

[284]  Halim Yanikomeroglu,et al.  Secure Communication in OFDMA-Based Cognitive Radio Networks: An Incentivized Secondary Network Coexistence Approach , 2017, IEEE Transactions on Vehicular Technology.

[285]  Félix J. García Clemente,et al.  Automatic monitoring management for 5G mobile networks , 2017, FNC/MobiSPC.

[286]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[287]  Inkyu Lee,et al.  UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.

[288]  Quanzhong Li,et al.  Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information , 2018, IEEE Transactions on Information Forensics and Security.

[289]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[290]  Qi Shi,et al.  Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[291]  Ping Zhang,et al.  A survey of testing for 5G: Solutions, opportunities, and challenges , 2019, China Communications.

[292]  G. A. Chukwudebe,et al.  Requirement analysis of IoT security in distributed systems , 2017, 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON).

[293]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[294]  Jani Suomalainen,et al.  Towards Micro-Segmentation in 5G Network Security , 2016 .

[295]  Ming Lim,et al.  An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems , 2018, China Communications.

[296]  Raimo Kantola,et al.  Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.

[297]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[298]  Maode Ma,et al.  Secure and Efficient Vertical Handover Authentication for 5G HetNets , 2018, 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP).

[299]  Igor Faynberg,et al.  NFV Security: Emerging Technologies and Standards , 2017, Guide to Security in SDN and NFV.

[300]  Huiming Wang,et al.  Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[301]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[302]  Ahmed Meddahi,et al.  A First Step Towards Security Extension for NFV Orchestrator , 2017, SDN-NFV@CODASPY.

[303]  Dianxiang Xu,et al.  Security of Software Defined Networks: A survey , 2015, Comput. Secur..

[304]  Hlaing Minn,et al.  Artificial Noise Aided Hybrid Precoding Design for Secure mmWave MISO Systems With Partial Channel Knowledge , 2017, IEEE Signal Processing Letters.

[305]  Ahmed Meddahi,et al.  SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[306]  Bo Ai,et al.  Physical Layer Security Over Fluctuating Two-Ray Fading Channels , 2018, IEEE Transactions on Vehicular Technology.

[307]  Mohammad Abdullah Al Faruque,et al.  Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[308]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[309]  Talal Alharbi,et al.  Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[310]  F. Richard Yu,et al.  Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.

[311]  Sasu Tarkoma,et al.  Software defined networking for security enhancement in wireless mobile networks , 2014, Comput. Networks.

[312]  Chao Li,et al.  Privacy in Internet of Things: From Principles to Technologies , 2018, IEEE Internet of Things Journal.

[313]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[314]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[315]  Mimoza Durresi,et al.  Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).

[316]  Young B. Moon,et al.  Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.

[317]  Xiqi Gao,et al.  Beam Domain Secure Transmission for Massive MIMO Communications , 2018, IEEE Transactions on Vehicular Technology.

[318]  Mamta Agiwal,et al.  Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .

[319]  Ahmed Meddahi,et al.  NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.

[320]  Yustus Eko Oktian,et al.  Securing distributed SDN with IBC , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.

[321]  Valtteri Niemi,et al.  Defeating the Downgrade Attack on Identity Privacy in 5G , 2018, SSR.

[322]  Ravishankar Borgaonkar,et al.  New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..

[323]  Tanesh Kumar,et al.  5G Privacy: Scenarios and Solutions , 2018, 2018 IEEE 5G World Forum (5GWF).

[324]  Hui-Ming Wang,et al.  MIMO Wiretap Channels Based on Generalized Extended Orthogonal STBCs and Feedback , 2018, IEEE Transactions on Vehicular Technology.

[325]  Paul F Scott Secrecy and surveillance: lessons from the law of IMSI catchers , 2019, International Review of Law, Computers & Technology.