|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Roman Odarchenko, Maksim Iavich, Giorgi Iashvili, Solomiia Fedushko and Yuriy Syerov
It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted ...
ver más
|
|
|
|
|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil...
ver más
|
|
|
|
|
|
|
Nuwan Weerasinghe, Muhammad Arslan Usman, Chaminda Hewage, Eckhard Pfluegel and Christos Politis
Implementing 5G-enabled Vehicle-to-Everything (V2X) intelligent transportation systems presents a promising opportunity to enhance road safety and traffic flow while facilitating the integration of artificial intelligence (AI) based solutions. Yet, secur...
ver más
|
|
|
|
|
|
|
Abubakar Ahmad Musa, Adamu Hussaini, Cheng Qian, Yifan Guo and Wei Yu
The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the col...
ver más
|
|
|
|
|
|
|
Zaher Salah and Esraa Abu Elsoud
The rise in internet users has brought with it the impending threat of cybercrime as the Internet of Things (IoT) increases and the introduction of 5G technologies continues to transform our digital world. It is now essential to protect communication net...
ver más
|
|
|
|
|
|
|
Yuejun Guo, Orhan Ermis, Qiang Tang, Hoang Trang and Alexandre De Oliveira
Signalling protocols are responsible for fundamental tasks such as initiating and terminating communication and identifying the state of the communication in telecommunication core networks. Signalling System No. 7 (SS7), Diameter, and GPRS Tunneling Pro...
ver más
|
|
|
|
|
|
|
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co...
ver más
|
|
|
|