Professional Documents
Culture Documents
Network
This article discusses the many architecture components of 5G that enable better
connection, communications, and computation, and which are either evolutionary
or revolutionary capabilities. We are seeing a trend towards heterogeneous
connection that extends from core to edge, and diverges even more by developing
new independent edge-to-edge connectivity as 5G standards are progressively
embraced and devices are conceived and constructed. Sensor and data inputs have
been increased to include a wide range of subjects and computer and
communication kinds, allowing for automation, high-bandwidth
communications, first responders, and ordinary communications. This study
looks at the advancements in 5G design and deployments that allow for increased
usability as well as the possibility for malicious exploitation. We conclude with
recommendations and a methodology for developing dependable, adaptable, and
secure infrastructure and applications in order to achieve the long-awaited
revolutionary interconnect.
5.Cao, Jin; Yan, Zheng; Ma, Ruihui; Zhang, Yinghui; Fu, Yulong; Li, Hui
(2020). LSAA: A Lightweight and Secure Access Authentication Scheme for both
UEs and mMTC Devices in 5G Networks. IEEE Internet of Things Journal, (), 1–
1. doi:10.1109/JIOT.2020.2976740
Smart City (SC) is a new idea that combines a "Digitalized Associated City" with
city organisation using information and communication technology (ICT). This
innovative approach provides in-depth information by expanding the intricacies
of the networking industry and serves as a link between the government,
businesses, and the general public. When it comes to cybersecurity, it's all about
information confidentiality and the dangers that come with SC systems. In this
study paper, we look at the security problems surrounding the development of SC
infrastructure, as well as the perspectives of both technological and commercial
operations. A Hybrid Smart City Cyber Security Architecture (HSCCA)
technique was also proposed. regarding the many participants who covey and also
assures end-user service delivery Our proposed technique also looks at the Cyber
Security (CS) measures put in place for smart cities. In addition, we emphasise
the unique characteristics of SC-generated cybersecurity concerns, as well as a
discussion of different aspects of the dangers connected with them. Finally, our
study finishes with an assessment of some of the most important cybersecurity
solutions for smart cities that have been offered to the HSCCA. This study
proposes a context-specific safety setup for traditional cyber-physical systems, as
well as a few potential topics to investigate and their implications.
7.Cybersecurity in Smart City: A systematic mapping study
Maryam Alamer, Mohammed Amin Almaiah
2021 International Conference on Information Technology (ICIT), 719-724, 202
The concept and philosophy of smart cities were developed specifically to take
advantage of high-tech capabilities to overcome the challenges and problems that
have arisen as a result of the massive urbanisation and boom that humanity has
experienced in recent years, particularly in the areas of sustainability, congestion,
transportation, and various energy uses. Furthermore, these smart cities strive to
enhance the standard of living and provide contemporary life services, such as
health care, more integrated transportation, pollution reduction, and other
services. There is a clear link between technological advancement and
cybersecurity dangers, as cybersecurity threats are a key impediment to achieving
these advantages. This paper outlines the advantages and prospects of smart
cities, as well as the difficulties, threats, and potential solutions for smart city
cybersecurity.
8.Elsaeidy, Asmaa; Elgendi, Ibrahim; Munasinghe, Kumudu S.; Sharma,
Dharmendra; Jamalipour, Abbas (2017). [IEEE 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) -
Melbourne, Australia (2017.11.22-2017.11.24)] 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) - A smart
city cyber security platform for narrowband networks. , (), 1–
6. doi:10.1109/ATNAC.2017.8215388
The concept of a smart city is getting a lot of traction throughout the world.
Narrowband technologies, with their powerful and efficient spectrum, would
have a significant influence on realising the smart city promises to its residents.
The predicted diversity of applications, diverse data formats, and large number of
connected devices for smart cities all add to the requirement for narrowband
technologies to be used. Narrowband technologies, on the other hand, contain
security flaws that make them a tempting target for cyber-attacks. A unique
platform architecture for securing smart cities from cyber attackers is given in
this research. A threat deep learning-based model is provided by the framework
to detect attackers based on user data behaviour. The suggested architecture might
be viewed as a first step toward creating a uniform paradigm for detecting and
blocking DoS attacks in real time for smart city applications.
9.Khatoun, Rida; Zeadally, Sherali (2017). Cybersecurity and Privacy Solutions
in Smart Cities. IEEE Communications Magazine, 55(3), 51–
59. doi:10.1109/MCOM.2017.1600297CM
Smart cities have grown in popularity as the development and deployment of ICT
in city infrastructure has expanded. A smart city's long-term goal is to improve
the quality of services offered to inhabitants and, as a result, their quality of life.
Incorporating ICT, on the other hand, raises a slew of security and privacy
concerns for smart city residents. We evaluate current smart city initiatives and
projects and briefly outline the essential design ideas of a smart city. We examine
several privacy and security solutions, guidelines, and standards for smart cities
and their services after identifying many security vulnerabilities and privacy
concerns in the context of smart cities that must be addressed.
10.Rathore, M. M., Paul, A., Ahmad, A., Chilamkurti, N., Hong, W.-H., & Seo,
H. (2018). Real-time secure communication for Smart City in high-speed Big
Data environment. Future Generation Computer Systems, 83, 638–652.
doi:10.1016/j.future.2017.08.006
Future smart cities have piqued the interest of many experts in recent years, since
they promise to substantially improve people's quality of life. The secure
management of a city's asset requires the integration of IoT and their
accompanying service delivery methods. The introduction of various IoT
technologies, as well as different architectural components and innovative entities
of evolving ICT systems, introduces new security risks and vulnerabilities. The
functioning of underlying wireless access technologies such as WSNs, SDR, CR,
and RFID is extremely important for large-scale, smooth communication among
numerous IoT technologies. We propose topical layered taxonomies to emphasise
the security vulnerabilities, assaults, and problems of important IoT enabling
technologies that support smart city development. We also highlight important
enablers and prospective needs that are critical to the creation of secure smart
cities. Finally, we go through some of the open issues that need to be addressed
in order to fully realise 5G's potential for future smart cities.
13. 5G Cybersecurity Vulnerabilities with IoT and Smart Societies
13.Yelda Shah, Nishan Chelvachandran, Stefan Kendzierskyj, Hamid
Jahankhani, Radovan Janoso
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, 159-
176, 2020
The security elements of the new 5G-IoT architecture, which was recently
designed by this research team, are examined in this article. At each layer of the
5G-IoT architecture, we classify potential security attacks. We propose a security
taxonomy for 5G-IoT architecture in the context of smart city applications as the
work's main contribution. This taxonomy is made up of five levels that are used
to defend against the attacks that have been examined as well as to secure the
privacy of customers. The number of layers is determined by the types of attacks,
with each type of attack affecting a different layer of the 5G-IoT architecture.
15. The novel system of attacks detection in 5G
Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei
Simonov
International Conference on Advanced Information Networking and
Applications, 580-591, 2021
The fifth generation (5G) of mobile networking technology will be used to build
future communication networks for public safety agencies. Police officers,
paramedics, border guards, and fire and rescue professionals will all be able to
communicate via a commercial operator's access network and quickly deployable
tactical bubbles. This shift from closed, dedicated infrastructure to hybrid
architecture will broaden the threat surface, exposing mission-critical
applications and sensitive data to cyber and physical attacks. The security
architecture and enablers for prioritised public safety communication in 5G
networks are investigated and surveyed. We examine enabling vulnerabilities,
threat actors, attack pathways, and risk levels in order to identify security threat
scenarios. Starting with push-to-talk and group video communication, security
enablers are questioned about tactical access and core networks, commercial
infrastructure, and mission-critical applications. Remote attestation improved
access control for restricted devices and safeguarding satellite backhauls are two
techniques that have been tested and detailed in further detail. Future research
topics are also discussed, with the need for enablers to automate the security of
quick deployments, military-grade cost-effective adaptations of commercial
network services to assure robustness, and hardening of various types of public
safety equipment being highlighted.
17. Cyber-Attack Detection and Mitigation Using SVM for 5G Network
Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Abdul Rahman
AlShehri
INTELLIGENT AUTOMATION AND SOFT COMPUTING 31 (1), 13-28,
2022
IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and
Connected Cars
Smart gadgets that are connected to the internet are referred to as Internet of
Things (IoT). A smart device is an electrical gadget that can communicate with
other devices or connect to a network like Wi-Fi. The proliferation of IoT devices
has aided in the advancement of technology in a variety of fields. The use of IoT
in 5G/B5G devices has provided numerous benefits, including the generation of
new ideas that can be turned into projects for tech companies, the generation of
big data (a large volume of data that can be used to reveal trends, patterns, and
associations), and the provision of multiple communication options. This has had
an influence on how businesses employ new technology to better their operations.
The increasing expansion of IoT, on the other hand, has created a new platform
for hackers to target. To assist cope with such threats and vulnerabilities, security
measures for IoT have been established. The Internet of Things (IoT) will be
discussed in regard to smart homes, smart cities, wearables, and linked autos in
this survey report. The advantages, hazards, and vulnerabilities associated with
employing such internet-connected gadgets will be highlighted.
19. Analyzing the architecture advantages and vulnerabilities in heterogeneous
5G wireless networks Bassam S Farroha, Deborah L Farroha, JS Farroha
2019 IEEE International Systems Conference (SysCon), 1-8, 2019
This article discusses the many architecture components of 5G that enable better
connection, communications, and computation, and which are either evolutionary
or revolutionary capabilities. We are seeing a trend towards heterogeneous
connection that extends from core to edge, and diverges even more by developing
new independent edge-to-edge connectivity as 5G standards are progressively
embraced and devices are conceived and constructed. Sensor and data inputs have
been increased to include a wide range of subjects and computer and
communication kinds, allowing for automation, high-bandwidth
communications, first responders, and ordinary communications. This study
looks at the advancements in 5G design and deployments that allow for increased
usability as well as the possibility for malicious exploitation. In order to offer the
much-desired revolutionary interconnect, 20.we conclude with principles and a
framework for constructing dependable, adaptable, and secure infrastructure and
applications.
20.5G Security Threat Assessment in Real Networks
Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim,
Sungmoon Kwon
Sensors 21 (16), 5524, 2021
4.Farroha, B.S.; Farroha, D.L.; Farroha, J.S. (2019). [IEEE 2019 IEEE
6. Sengan, S., V., S., Nair, S. K., V., I., J., M., & Ravi, L. (2020). Enhancing
cyber-physical systems with hybrid smart city cyber security architecture for
secure public data-smart network. Future Generation Computer
Systems. doi:10.1016/j.future.2020.06.028
6.Enhancing cyber-physical systems with hybrid smart city cyber security
architecture for secure public data-smart network
10. Rathore, M. M., Paul, A., Ahmad, A., Chilamkurti, N., Hong, W.-H., & Seo,
H. (2018). Real-time secure communication for Smart City in high-speed Big
Data environment. Future Generation Computer Systems, 83, 638–652.
doi:10.1016/j.future.2017.08.006
.12. Akhunzada, Adnan; Islam, Saif ul; Zeadally, Sherali (2020). Securing
Cyberspace of Future Smart Cities with 5G Technologies. IEEE Network, 34(4),
336–342. doi:10.1109/MNET.001.1900559
18. IoT for 5G/B5G applications in smart homes, smart cities, wearables and
connected cars
Hasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom, Naeem
Ramzan, Masood Ur-Rehman, Muhammad Ali Imran
2019 IEEE 24th International Workshop on Computer Aided Modeling and
Design of Communication Links and Networks (CAMAD), 1-5, 2019
19. Analyzing the architecture advantages and vulnerabilities in heterogeneous
5G wireless networks Bassam S Farroha, Deborah L Farroha, JS Farroha
2019 IEEE International Systems Conference (SysCon), 1-8, 2019