You are on page 1of 26

School of Information Technology and Engineering

M.Tech (Software Engineering)


WIN 2021-22
CSE 3502: Information Security Management
Slot:F2+TF2
Digital Assignment – I
TOPIC: 5G Cyber security Vulnerabilities , Hybrid smart
city cyber security architecture for secure public data-
smart network.
By:
18MIS0179
S.NAVEEN
1.Shubham Gupta, Balu L Parne, Narendra S Chaudhari
2018 First International Conference on Secure Cyber Computing and
Communication (ICSCCC), 369-374, 2018

Security Vulnerabilities in Handover Authentication Mechanism of 5G

Network

With the advancement of Fifth Generation (5G) mobile communications


technology, the major goal of the Third Generation Partnership Project (3GPP) is
to meet the growing security demands of IoT-based applications. The 3GPP
issued a study report on the handover architecture and security operations of 5G
communication networks in June 2018. The key hierarchy of the 5G handover
key mechanism is discussed in this study. Furthermore, the inter-gNB handover
authentication technique in a 5G communication network is investigated to
uncover security vulnerabilities such as fake base-station attack, de-
synchronization attack, key compromise, and so on. Furthermore, due to high
signalling cost, the handover approach suffers from authentication difficulty. We
offer countermeasures such as pre-authentication of communication entities,
delegation of authentication, and pre-distribution of secret keys to address these
issues. This is the first study on 5G handover security. We anticipate that the
offered solutions will address the aforementioned security concerns as well as the
fundamental resilience issue.
2.Suomalainen, Jani; Juhola, Arto; Shahabuddin, Shahriar; Mammela, Aarne;
Ahmad, Ijaz (2020). Machine Learning Threatens 5G Security. IEEE Access, 8(),
190822–190842. doi:10.1109/access.2020.3031966

Machine Learning Threatens 5G Security

In the fifth generation (5G) of mobile networks, machine learning (ML) is


expected to tackle a number of problems. However, machine learning will expose
the network to a number of major cybersecurity flaws. The majority of ML
learning occurs from data acquired from the environment. Machines absorbing
data to provide actionable insight for the network will be severely harmed by
unfiltered data. On the other hand, scrutinising data raises privacy concerns.
Unfortunately, the majority of machine learning methods have been adapted from
other fields that produce outstanding results in limited, confined contexts. The
adoption of such ML systems in 5G may unintentionally expose the network to
major security risks such as unfair resource allocation, denial of service, and the
leaking of private and confidential data. As a result, in this essay, we look at the
flaws in the most popular machine learning systems that are now being explored
for implementation in 5G. We identify and survey additional methods for
avoiding ML problems in 5G networks.
3.Ahmad, Ijaz; Shahabuddin, Shahriar; Kumar, Tanesh; Okwuibe, Jude; Gurtov,
Andrei; Ylianttila, Mika (2019). Security for 5G and Beyond. IEEE
Communications Surveys & Tutorials, (), 1–
1. doi:10.1109/COMST.2019.2916180

Security for 5G and Beyond

The development of Fifth Generation (5G) wireless networks is gaining traction,


with the goal of connecting practically every part of life via the network at
significantly greater speeds, with extremely low latency, and with ubiquitous
connection. The network, because of its critical significance in our lives, must
protect its users, components, and services. Because of the extraordinary
expansion in the sorts of services and the quantity of devices, the security threat
environment for 5G has exploded. As a result, if security solutions have not yet
been built, they must be envisioned to deal with a variety of attacks on numerous
services, innovative technologies, and increasing user data available over the
network. This article describes the 5G network threat landscape, as well as the
security vulnerabilities in the new technological concepts that will be adopted by
5G, and offers either solutions or future directions to address those threats. In this
paper, we also give a brief overview of post-5G cellular technologies and their
security vulnerabilities, which we refer to as Future Generations (XG). In
summary, this article discusses current and future security challenges in wireless
networks, with a focus on 5G, as well as future directions for securing wireless
networks beyond 5G.
4.Farroha, B.S.; Farroha, D.L.; Farroha, J.S. (2019). [IEEE 2019 IEEE
International Systems Conference (SysCon) - Orlando, FL, USA (2019.4.8-
2019.4.11)] 2019 IEEE International Systems Conference (SysCon) - Analyzing
the Architecture Advantages and Vulnerabilities in Heterogeneous 5G Wireless
Networks. , (), 1–8. doi:10.1109/SYSCON.2019.8836930

Analyzing the Architecture Advantages and Vulnerabilities in

Heterogeneous 5G Wireless Networks

This article discusses the many architecture components of 5G that enable better
connection, communications, and computation, and which are either evolutionary
or revolutionary capabilities. We are seeing a trend towards heterogeneous
connection that extends from core to edge, and diverges even more by developing
new independent edge-to-edge connectivity as 5G standards are progressively
embraced and devices are conceived and constructed. Sensor and data inputs have
been increased to include a wide range of subjects and computer and
communication kinds, allowing for automation, high-bandwidth
communications, first responders, and ordinary communications. This study
looks at the advancements in 5G design and deployments that allow for increased
usability as well as the possibility for malicious exploitation. We conclude with
recommendations and a methodology for developing dependable, adaptable, and
secure infrastructure and applications in order to achieve the long-awaited
revolutionary interconnect.
5.Cao, Jin; Yan, Zheng; Ma, Ruihui; Zhang, Yinghui; Fu, Yulong; Li, Hui
(2020). LSAA: A Lightweight and Secure Access Authentication Scheme for both
UEs and mMTC Devices in 5G Networks. IEEE Internet of Things Journal, (), 1–
1. doi:10.1109/JIOT.2020.2976740

LSAA: A Lightweight and Secure Access Authentication Scheme for Both

UE and mMTC Devices in 5G Networks

—Isogeometric analysis, a new breakthrough, provides a comprehensive


framework for the design, analysis, and optimization of functional products in
industry. Traditional volume rendering methods for examining numerical
simulation results cannot be directly applied to isogeometric models. We describe
a new method for interactively visualising isogeometric analysis results that
ensures precise, pixel-exact geometry of the volume and its enclosing surfaces. A
multi-stage algorithm use the whole OpenGL pipeline, incorporating techniques
from surface rendering, order-independent transparency, and theoretical and
numerical methods for ordinary differential equations. We demonstrate the
effectiveness of our technique on a variety of industry-relevant models, including
quality inspection of geometry parametrization, stress analysis in linear elasticity,
and visualisation of computational fluid dynamics findings.
6.Sengan, S., V., S., Nair, S. K., V., I., J., M., & Ravi, L. (2020). Enhancing
cyber-physical systems with hybrid smart city cyber security architecture for
secure public data-smart network. Future Generation Computer
Systems. doi:10.1016/j.future.2020.06.028

Enhancing cyber-physical systems with hybrid smart city cyber security


architecture for secure public data-smart network

Smart City (SC) is a new idea that combines a "Digitalized Associated City" with
city organisation using information and communication technology (ICT). This
innovative approach provides in-depth information by expanding the intricacies
of the networking industry and serves as a link between the government,
businesses, and the general public. When it comes to cybersecurity, it's all about
information confidentiality and the dangers that come with SC systems. In this
study paper, we look at the security problems surrounding the development of SC
infrastructure, as well as the perspectives of both technological and commercial
operations. A Hybrid Smart City Cyber Security Architecture (HSCCA)
technique was also proposed. regarding the many participants who covey and also
assures end-user service delivery Our proposed technique also looks at the Cyber
Security (CS) measures put in place for smart cities. In addition, we emphasise
the unique characteristics of SC-generated cybersecurity concerns, as well as a
discussion of different aspects of the dangers connected with them. Finally, our
study finishes with an assessment of some of the most important cybersecurity
solutions for smart cities that have been offered to the HSCCA. This study
proposes a context-specific safety setup for traditional cyber-physical systems, as
well as a few potential topics to investigate and their implications.
7.Cybersecurity in Smart City: A systematic mapping study
Maryam Alamer, Mohammed Amin Almaiah
2021 International Conference on Information Technology (ICIT), 719-724, 202

Cybersecurity in Smart City: A systematic mapping study

The concept and philosophy of smart cities were developed specifically to take
advantage of high-tech capabilities to overcome the challenges and problems that
have arisen as a result of the massive urbanisation and boom that humanity has
experienced in recent years, particularly in the areas of sustainability, congestion,
transportation, and various energy uses. Furthermore, these smart cities strive to
enhance the standard of living and provide contemporary life services, such as
health care, more integrated transportation, pollution reduction, and other
services. There is a clear link between technological advancement and
cybersecurity dangers, as cybersecurity threats are a key impediment to achieving
these advantages. This paper outlines the advantages and prospects of smart
cities, as well as the difficulties, threats, and potential solutions for smart city
cybersecurity.
8.Elsaeidy, Asmaa; Elgendi, Ibrahim; Munasinghe, Kumudu S.; Sharma,
Dharmendra; Jamalipour, Abbas (2017). [IEEE 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) -
Melbourne, Australia (2017.11.22-2017.11.24)] 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) - A smart
city cyber security platform for narrowband networks. , (), 1–
6. doi:10.1109/ATNAC.2017.8215388

A Smart City Cyber Security Platform for Narrowband Networks

The concept of a smart city is getting a lot of traction throughout the world.
Narrowband technologies, with their powerful and efficient spectrum, would
have a significant influence on realising the smart city promises to its residents.
The predicted diversity of applications, diverse data formats, and large number of
connected devices for smart cities all add to the requirement for narrowband
technologies to be used. Narrowband technologies, on the other hand, contain
security flaws that make them a tempting target for cyber-attacks. A unique
platform architecture for securing smart cities from cyber attackers is given in
this research. A threat deep learning-based model is provided by the framework
to detect attackers based on user data behaviour. The suggested architecture might
be viewed as a first step toward creating a uniform paradigm for detecting and
blocking DoS attacks in real time for smart city applications.
9.Khatoun, Rida; Zeadally, Sherali (2017). Cybersecurity and Privacy Solutions
in Smart Cities. IEEE Communications Magazine, 55(3), 51–
59. doi:10.1109/MCOM.2017.1600297CM

Cybersecurity and Privacy Solutions in Smart Cities

Smart cities have grown in popularity as the development and deployment of ICT
in city infrastructure has expanded. A smart city's long-term goal is to improve
the quality of services offered to inhabitants and, as a result, their quality of life.
Incorporating ICT, on the other hand, raises a slew of security and privacy
concerns for smart city residents. We evaluate current smart city initiatives and
projects and briefly outline the essential design ideas of a smart city. We examine
several privacy and security solutions, guidelines, and standards for smart cities
and their services after identifying many security vulnerabilities and privacy
concerns in the context of smart cities that must be addressed.
10.Rathore, M. M., Paul, A., Ahmad, A., Chilamkurti, N., Hong, W.-H., & Seo,
H. (2018). Real-time secure communication for Smart City in high-speed Big
Data environment. Future Generation Computer Systems, 83, 638–652.
doi:10.1016/j.future.2017.08.006

Real-time secure communication for Smart City in high-speed Big Data


environment

The notion of Smart City was introduced by recent technological advancements,


which is done by analysing data obtained from different smart systems in the city
utilising millions of sensors and gadgets connected through the Internet, referred
to as the Internet of Things (IoT). Big Data is the enormous volume of high-speed
streaming data generated by these gadgets. However, the production of municipal
data at a remote site and subsequent transmission to central city computers for
analysis poses security and privacy problems. Providing security to such Big Data
streaming, on the other hand, necessitates a high-speed security system that can
operate in a real-time context without causing any delays that might slow down
overall performance of the smart city. To address these issues, we propose an
efficient and real-time Smart City security system that includes strong intrusion
detection at the intelligent city building (ICB) as well as a security protocol to
protect communication between the remote smart system (RSS)/user and the city
analysis building, i.e., ICB, in this paper. The proposed communication security
protocol is divided into many phases, including registration, session key
exchange, session key revocation, and data transfer phases from RSS to ICB and
User to ICB. To assess the system's reliability, extensive security studies are
carried out. The proposed system is also assessed for its efficiency in terms of
computing cost and throughput of the system's overall functions.
11.Tamane, Sharvari Chandrashekhar; Dey, Nilanjan; Hassanien, Aboul-Ella
(2021). [Studies in Systems, Decision and Control] Security and Privacy
Applications for Smart City Development Volume 308 || . , 10.1007/978-3-030-
53149-2(), –. doi:10.1007/978-3-030-53149-2

Privacy and Security Technologies for Smart City Development

The ever-increasing urban population, along with recent technology


advancements such as the Internet of Things (IoT), sensors, big data, cloud
computing, and data analytics, have displaced traditional means of providing
services to residents. By monitoring an individual's everyday actions, IoT devices
collect real-time and integrated data with the goal of offering efficient services
such as smart transportation, waste management, tailored healthcare, and
suggestions. Because these gadgets acquire personal and sensitive data, security
and privacy concerns are critical concepts to consider. While security and privacy
have always been important research topics, there is a need for a broader approach
to protect personal data as technological challenges evolve. This chapter
introduces the present infrastructure's security and privacy challenges. Some case
studies are discussed, along with the data privacy and security measures taken.
The chapter concludes with a discussion of open research challenges in the areas
of security and privacy.
12.Akhunzada, Adnan; Islam, Saif ul; Zeadally, Sherali (2020). Securing
Cyberspace of Future Smart Cities with 5G Technologies. IEEE Network, 34(4),
336–342. doi:10.1109/MNET.001.1900559

Securing Cyberspace of Future Smart Cities with 5G Technologies

Future smart cities have piqued the interest of many experts in recent years, since
they promise to substantially improve people's quality of life. The secure
management of a city's asset requires the integration of IoT and their
accompanying service delivery methods. The introduction of various IoT
technologies, as well as different architectural components and innovative entities
of evolving ICT systems, introduces new security risks and vulnerabilities. The
functioning of underlying wireless access technologies such as WSNs, SDR, CR,
and RFID is extremely important for large-scale, smooth communication among
numerous IoT technologies. We propose topical layered taxonomies to emphasise
the security vulnerabilities, assaults, and problems of important IoT enabling
technologies that support smart city development. We also highlight important
enablers and prospective needs that are critical to the creation of secure smart
cities. Finally, we go through some of the open issues that need to be addressed
in order to fully realise 5G's potential for future smart cities.
13. 5G Cybersecurity Vulnerabilities with IoT and Smart Societies
13.Yelda Shah, Nishan Chelvachandran, Stefan Kendzierskyj, Hamid
Jahankhani, Radovan Janoso
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, 159-
176, 2020

5G Cybersecurity Vulnerabilities with IoT and Smart Societies

The fifth generation of wireless communication, known as 5G, is intended to


provide long-distance coverage, reliable connections, and fast data download and
upload speeds. Because of 5G's wireless-based technology, data migration may
reach a pace of 20 Gbps (Gigabit per second) using wireless mobile data
connections, making it easier to manage large amounts of data transfer. When
compared to earlier generations of mobile data telephony, the protocol's capacity
to carry large amounts of data at low latency makes it excellent for both present
IoT and automated systems, as well as enabling the creation and spread of more.
The deployment of smart technology has been hampered by data transfer speeds
and latency rates. Despite 4G connectivity's relatively high data speeds, the
availability and development of infrastructure, as well as the explosion in the
ownership and use of devices that use the technology, has been a limiting factor
in the rollout and use of AI and automated technologies such as driverless
vehicles and smart city implementations. While 5G promises to overcome the
restrictions imposed by earlier generations, it also has problems. While millimetre
wave's high frequency and short wavelength enable fast data transfer rates and
low latency, it also has a relatively short effective distance. The signal starts to
weaken after only a short distance, and the deterioration is exponential beyond
that.
14. On the security of the 5G-IoT architecture
Hamed Rahimi, Ali Zibaeenejad, Parsa Rajabzadeh, Ali Akbar Safavi
Proceedings of the international conference on smart cities and internet of things,
1-8, 2018

On the security of the 5G-IoT architecture

The security elements of the new 5G-IoT architecture, which was recently
designed by this research team, are examined in this article. At each layer of the
5G-IoT architecture, we classify potential security attacks. We propose a security
taxonomy for 5G-IoT architecture in the context of smart city applications as the
work's main contribution. This taxonomy is made up of five levels that are used
to defend against the attacks that have been examined as well as to secure the
privacy of customers. The number of layers is determined by the types of attacks,
with each type of attack affecting a different layer of the 5G-IoT architecture.
15. The novel system of attacks detection in 5G
Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei
Simonov
International Conference on Advanced Information Networking and
Applications, 580-591, 2021

The novel system of attacks detection in 5G

The volume of traffic transported through wireless networks is quickly


increasing, and this growth is being fueled by a variety of sources. To meet the
demands of present and new use cases, the telecoms sector is experiencing a
dramatic change toward 5G networks. The article investigates the 5G ecosystem's
current vulnerabilities. We suggest a new cyber security model that incorporates
machine learning techniques in light of our research. Firewall and IDS/IPS are
included in the function. The given approach is integrated into an existing 5G
architecture. The algorithmic core's technique and pseudo code are supplied. This
approach's efficacy is also investigated in the paper.The tests are done in a test
laboratory, which contains a server and 60 raspberry pi hardware units that are
employed in order to mimic assaults on the server. The experiments demonstrate
that the given strategy recognises DOS/DDOS attack significantly better than
approaches mentioned in the relevant studies. The study also proposes an
improvement technique that will be incorporated in future system versions.
16. Securing public safety communications on commercial and tactical 5G
networks: a survey and future research directions
Jani Suomalainen, Jukka Julku, Mikko Vehkaperä, Harri Posti
IEEE Open Journal of the Communications Society 2, 1590-1615, 2021

Securing public safety communications on commercial and tactical 5G


networks

The fifth generation (5G) of mobile networking technology will be used to build
future communication networks for public safety agencies. Police officers,
paramedics, border guards, and fire and rescue professionals will all be able to
communicate via a commercial operator's access network and quickly deployable
tactical bubbles. This shift from closed, dedicated infrastructure to hybrid
architecture will broaden the threat surface, exposing mission-critical
applications and sensitive data to cyber and physical attacks. The security
architecture and enablers for prioritised public safety communication in 5G
networks are investigated and surveyed. We examine enabling vulnerabilities,
threat actors, attack pathways, and risk levels in order to identify security threat
scenarios. Starting with push-to-talk and group video communication, security
enablers are questioned about tactical access and core networks, commercial
infrastructure, and mission-critical applications. Remote attestation improved
access control for restricted devices and safeguarding satellite backhauls are two
techniques that have been tested and detailed in further detail. Future research
topics are also discussed, with the need for enablers to automate the security of
quick deployments, military-grade cost-effective adaptations of commercial
network services to assure robustness, and hardening of various types of public
safety equipment being highlighted.
17. Cyber-Attack Detection and Mitigation Using SVM for 5G Network
Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Abdul Rahman
AlShehri
INTELLIGENT AUTOMATION AND SOFT COMPUTING 31 (1), 13-28,
2022

Cyber-Attack Detection and Mitigation Using SVM for 5G Network

Detection and Response to Cyber-Attacks For a 5G network, SVM is used. Mohamed


Abdul Rahman AlShehri, Sulaiman Yousef Alshunaifi, Shailendra Mishra
INTELLIGENT AUTOMATION AND SOFT COMPUTING, vol. 31, no. 1, 2022, pp.
13-28. For the IT and telecoms industries, 5G technology is widely seen as a game-
changer. Lower latency, larger capacity, and more bandwidth are projected to be among
the benefits of 5G. In terms of AI assistance, 5G has the ability to deliver greater
capacity, enhancing the advantages to the IT and telecom industries. Fraudsters can take
control or harm business data by exploiting a variety of security risks and organisational
flaws. This study looks at 4G (LTE) and 5G technology's cybersecurity challenges and
vulnerabilities. The results of this study were based on both primary and secondary data.
Reviewing books and conducting surveys were used to get secondary data. The support
vector machine (SVM) technique was used to retrieve primary data from an
experimental simulation. The findings suggest that 4G and 5G cybersecurity
vulnerabilities must be addressed in order to assure integrity, confidentiality, and
availability. Every business is continually exposed to a range of threats. For the 5G
network, an efficient SVM-based threat detection and mitigation system was also
created. In the 5G context, the suggested intrusion detection system protects against
security assaults. The findings reveal that the suggested intrusion detection and defence
system achieves superior QoS by increasing throughput and intrusion detection rate
while lowering latency, energy usage, and packet loss ratio. The security systems
identify and mitigate cyber-attacks quickly and effectively.
18. IoT for 5G/B5G applications in smart homes, smart cities, wearables and
connected cars
Hasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom, Naeem
Ramzan, Masood Ur-Rehman, Muhammad Ali Imran
2019 IEEE 24th International Workshop on Computer Aided Modeling and
Design of Communication Links and Networks (CAMAD), 1-5, 2019

IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and

Connected Cars

Smart gadgets that are connected to the internet are referred to as Internet of
Things (IoT). A smart device is an electrical gadget that can communicate with
other devices or connect to a network like Wi-Fi. The proliferation of IoT devices
has aided in the advancement of technology in a variety of fields. The use of IoT
in 5G/B5G devices has provided numerous benefits, including the generation of
new ideas that can be turned into projects for tech companies, the generation of
big data (a large volume of data that can be used to reveal trends, patterns, and
associations), and the provision of multiple communication options. This has had
an influence on how businesses employ new technology to better their operations.
The increasing expansion of IoT, on the other hand, has created a new platform
for hackers to target. To assist cope with such threats and vulnerabilities, security
measures for IoT have been established. The Internet of Things (IoT) will be
discussed in regard to smart homes, smart cities, wearables, and linked autos in
this survey report. The advantages, hazards, and vulnerabilities associated with
employing such internet-connected gadgets will be highlighted.
19. Analyzing the architecture advantages and vulnerabilities in heterogeneous
5G wireless networks Bassam S Farroha, Deborah L Farroha, JS Farroha
2019 IEEE International Systems Conference (SysCon), 1-8, 2019

Analyzing the Architecture Advantages and Vulnerabilities in

Heterogeneous 5G Wireless Networks

This article discusses the many architecture components of 5G that enable better
connection, communications, and computation, and which are either evolutionary
or revolutionary capabilities. We are seeing a trend towards heterogeneous
connection that extends from core to edge, and diverges even more by developing
new independent edge-to-edge connectivity as 5G standards are progressively
embraced and devices are conceived and constructed. Sensor and data inputs have
been increased to include a wide range of subjects and computer and
communication kinds, allowing for automation, high-bandwidth
communications, first responders, and ordinary communications. This study
looks at the advancements in 5G design and deployments that allow for increased
usability as well as the possibility for malicious exploitation. In order to offer the
much-desired revolutionary interconnect, 20.we conclude with principles and a
framework for constructing dependable, adaptable, and secure infrastructure and
applications.
20.5G Security Threat Assessment in Real Networks
Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim,
Sungmoon Kwon
Sensors 21 (16), 5524, 2021

5G Security Threat Assessment in Real Networks

Advances in mobile communication networks from 2G to 5G have resulted in


unprecedented traffic growth, and 5G mobile communication networks are
expected to be used in a variety of industries thanks to innovative technologies
that are fast not only in terms of extremely low latency but also in terms of
massive access devices. Enhanced mobile broadband (eMBB), massive machine
type communication (mMTC), and ultra-reliable and low latency communication
(uRLLC) are all examples of services that have seen a rise in the number of
assaults on customers' personal information, private information, and privacy
information.
References :
1. 1.Shubham Gupta, Balu L Parne, Narendra S Chaudhari
2018 First International Conference on Secure Cyber Computing and
Communication (ICSCCC), 369-374, 2018

2. Suomalainen, Jani; Juhola, Arto; Shahabuddin, Shahriar; Mammela, Aarne;


Ahmad, Ijaz (2020). Machine Learning Threatens 5G Security. IEEE Access, 8(),
190822–190842. doi:10.1109/access.2020.3031966

3. Ahmad, Ijaz; Shahabuddin, Shahriar; Kumar, Tanesh; Okwuibe, Jude; Gurtov,


Andrei; Ylianttila, Mika (2019). Security for 5G and Beyond. IEEE
Communications Surveys & Tutorials, (), 1–
1. doi:10.1109/COMST.2019.2916180

4.Farroha, B.S.; Farroha, D.L.; Farroha, J.S. (2019). [IEEE 2019 IEEE

International Systems Conference (SysCon) - Orlando, FL, USA (2019.4.8-

2019.4.11)] 2019 IEEE International Systems Conference (SysCon) - Analyzing

the Architecture Advantages and Vulnerabilities in Heterogeneous 5G Wireless

Networks. , (), 1–8. doi:10.1109/SYSCON.2019.8836930


5.Cao, Jin; Yan, Zheng; Ma, Ruihui; Zhang, Yinghui; Fu, Yulong; Li, Hui
(2020). LSAA: A Lightweight and Secure Access Authentication Scheme for both
UEs and mMTC Devices in 5G Networks. IEEE Internet of Things Journal, (), 1–
1. doi:10.1109/JIOT.2020.2976740

6. Sengan, S., V., S., Nair, S. K., V., I., J., M., & Ravi, L. (2020). Enhancing
cyber-physical systems with hybrid smart city cyber security architecture for
secure public data-smart network. Future Generation Computer
Systems. doi:10.1016/j.future.2020.06.028
6.Enhancing cyber-physical systems with hybrid smart city cyber security
architecture for secure public data-smart network

7. Cybersecurity in Smart City: A systematic mapping study


Maryam Alamer, Mohammed Amin Almaiah
2021 International Conference on Information Technology (ICIT), 719-724, 202

8. Elsaeidy, Asmaa; Elgendi, Ibrahim; Munasinghe, Kumudu S.; Sharma,


Dharmendra; Jamalipour, Abbas (2017). [IEEE 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) -
Melbourne, Australia (2017.11.22-2017.11.24)] 2017 27th International
Telecommunication Networks and Applications Conference (ITNAC) - A smart
city cyber security platform for narrowband networks. , (), 1–
6. doi:10.1109/ATNAC.2017.8215388
9. Khatoun, Rida; Zeadally, Sherali (2017). Cybersecurity and Privacy Solutions
in Smart Cities. IEEE Communications Magazine, 55(3), 51–
59. doi:10.1109/MCOM.2017.1600297CM

10. Rathore, M. M., Paul, A., Ahmad, A., Chilamkurti, N., Hong, W.-H., & Seo,
H. (2018). Real-time secure communication for Smart City in high-speed Big
Data environment. Future Generation Computer Systems, 83, 638–652.
doi:10.1016/j.future.2017.08.006

11. Tamane, Sharvari Chandrashekhar; Dey, Nilanjan; Hassanien, Aboul-Ella


(2021). [Studies in Systems, Decision and Control] Security and Privacy
Applications for Smart City Development Volume 308 || . , 10.1007/978-3-030-
53149-2(), –. doi:10.1007/978-3-030-53149-2

.12. Akhunzada, Adnan; Islam, Saif ul; Zeadally, Sherali (2020). Securing
Cyberspace of Future Smart Cities with 5G Technologies. IEEE Network, 34(4),
336–342. doi:10.1109/MNET.001.1900559

13.5G Cybersecurity Vulnerabilities with IoT and Smart Societies


Yelda Shah, Nishan Chelvachandran, Stefan Kendzierskyj, Hamid Jahankhani,
Radovan Janoso
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, 159-
176, 2020

14. On the security of the 5G-IoT architecture


Hamed Rahimi, Ali Zibaeenejad, Parsa Rajabzadeh, Ali Akbar Safavi
Proceedings of the international conference on smart cities and internet of things,
1-8, 2018
15. The novel system of attacks detection in 5G
Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei
Simonov
International Conference on Advanced Information Networking and
Applications, 580-591, 2021

16. Securing public safety communications on commercial and tactical 5G


networks: a survey and future research directions
Jani Suomalainen, Jukka Julku, Mikko Vehkaperä, Harri Posti
IEEE Open Journal of the Communications Society 2, 1590-1615, 2021

17. Cyber-Attack Detection and Mitigation Using SVM for 5G Network


Sulaiman Yousef Alshunaifi, Shailendra Mishra, Mohammed Abdul Rahman
AlShehri
INTELLIGENT AUTOMATION AND SOFT COMPUTING 31 (1), 13-28,
2022

18. IoT for 5G/B5G applications in smart homes, smart cities, wearables and
connected cars
Hasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom, Naeem
Ramzan, Masood Ur-Rehman, Muhammad Ali Imran
2019 IEEE 24th International Workshop on Computer Aided Modeling and
Design of Communication Links and Networks (CAMAD), 1-5, 2019
19. Analyzing the architecture advantages and vulnerabilities in heterogeneous
5G wireless networks Bassam S Farroha, Deborah L Farroha, JS Farroha
2019 IEEE International Systems Conference (SysCon), 1-8, 2019

20.5G Security Threat Assessment in Real Networks


Seongmin Park, Daeun Kim, Youngkwon Park, Hyungjin Cho, Dowon Kim,
Sungmoon Kwon
Sensors 21 (16), 5524, 2021

You might also like