Journal of Cybersecurity and Privacy,
Год журнала:
2024,
Номер
4(3), С. 678 - 730
Опубликована: Сен. 18, 2024
The
Internet
has
become
the
primary
vehicle
for
doing
almost
everything
online,
and
smartphones
are
needed
everyone
to
live
their
daily
lives.
As
a
result,
cybersecurity
is
top
priority
in
today’s
world.
usage
grown
exponentially
with
billions
of
users
proliferation
Things
(IoT)
devices,
cat-and-mouse
game
between
attackers
defenders.
Cyberattacks
on
systems
commonplace,
defense
mechanisms
continually
updated
prevent
them.
Based
literature
review
vulnerabilities,
attacks,
preventive
measures,
we
find
that
problems
rooted
computer
system
architectures,
operating
systems,
network
protocols,
design
options,
heterogeneity,
complexity,
evolution,
open
open-source
software
user
convenience,
ease
access,
global
users,
advertisements,
business
needs,
market.
We
investigate
common
vulnerabilities
bare
machine
computing
(BMC)
paradigm
possible
solution
address
eliminate
root
causes
at
many
levels.
study
22
cyberattacks,
identify
causes,
currently
used
compare
conventional
characteristics
evaluate
BMC
its
applications
respect
these
attacks.
Our
finds
resilient
most
except
few
physical
also
have
inherent
security
all
information
Further
research
validate
strengths
applications.
ACM Computing Surveys,
Год журнала:
2024,
Номер
56(10), С. 1 - 39
Опубликована: Апрель 10, 2024
Vehicular
Ad
Hoc
Networks
(VANETs)
are
powerful
platforms
for
vehicular
data
services
and
applications.
The
increasing
number
of
vehicles
has
made
the
network
diverse,
dynamic,
large-scale,
making
it
difficult
to
meet
5G
network’s
demanding
requirements.
Decentralized
systems
interesting
provide
attractive
because
they
publicly
available
(transparency),
have
an
append-only
ledger
(robust
integrity
protection),
remove
single
points
failure,
enable
distributed
key
management
communication
in
a
peer-to-peer
network.
Researchers
dedicated
substantial
efforts
advancing
vehicle
communications,
however
conventional
cryptographic
mechanisms
insufficient
which
enabled
us
look
at
decentralized
technologies.
Therefore,
we
revisit
approaches
with
VANETs.
Endpoint
devices
hold
wallet
may
incorporate
threshold
methods
like
MPC
wallets,
HD
Wallets,
or
multi-party
ECDSA/EdDSA/BLS.
We
also
discuss
trust
demonstrate
how
decentralization
can
improve
integrity,
security,
privacy,
resilience
failure.
conduct
comprehensive
review,
comparing
them
current
requirements,
latest
authentication
secure
architectures,
require
involvement
trusted
but
non-transparent
authorities
certificate
issuance/revocation.
highlight
limitations
these
schemes
from
PKI
deployment
recommend
future
research,
particularly
realm
quantum
cryptography.
Abstract
The
advent
of
5G
networks
has
precipitated
an
unparalleled
surge
in
demand
for
mobile
communication
services,
propelled
by
the
sophisticated
wireless
technologies.
An
increasing
number
countries
are
moving
from
fourth
generation
(4G)
to
fifth
(5G)
networks,
creating
a
new
expectation
services
that
dynamic,
transparent,
and
differentiated.
It
is
anticipated
these
will
be
adapted
multitude
use
cases
become
standard
practice.
diversity
increasingly
complex
network
infrastructures
present
significant
challenges,
particularly
management
resources
orchestration
services.
Network
Slicing
emerging
as
promising
approach
address
it
facilitates
efficient
Resource
Allocation
(RA)
supports
self‐service
capabilities.
However,
effective
segmentation
implementation
requires
development
robust
algorithms
guarantee
optimal
RA.
In
this
regard,
artificial
intelligence
machine
learning
(ML)
have
demonstrated
their
utility
analysis
large
datasets
facilitation
intelligent
decision‐making
processes.
certain
ML
methodologies
limited
ability
adapt
evolving
environments
characteristic
beyond
(B5G/6G).
This
paper
examines
specific
challenges
associated
with
evolution
B5G/6G
particular
focus
on
solutions
RA
dynamic
slicing
requirements.
Moreover,
article
presents
potential
avenues
further
research
domain
objective
enhancing
efficiency
next‐generation
through
adoption
innovative
technological
solutions.
IEEE Transactions on Consumer Electronics,
Год журнала:
2024,
Номер
70(3), С. 5702 - 5710
Опубликована: Апрель 15, 2024
Sixth
generation
(6G)-enabled
smart
cities
with
intelligent
reconfigurable
surfaces
(IRSs),
unmanned
aerial
vehicles
(UAVs),
and
non-orthogonal
multiple
access
(NOMA)
technologies
have
the
potential
to
transform
consumer
electronics
through
ultra-fast
wireless
connectivity,
effective
resource
utilization,
urban
services.
This
paper
presents
a
new
optimization
scheme
in
NOMA
multi-UAV
(M-UAV)
networks
by
utilizing
IRSs.
The
proposed
focuses
on
ground
user
equipment
(GUE)
UAV
association,
power
allocation
IRS
passive
beamforming
(BF),
objective
of
enhancing
system's
spectral
efficiency
(SE)
under
assumption
imperfect
successive
interference
cancellation
(i-SIC).
To
tackle
non-linearity
problem,
we
first
perform
GUE
association
for
available
BF.
Then,
decouple
joint
transmit
BF
design
problem
into
two
parts.
Subsequently,
an
efficient
solution
is
achieved
employing
combination
sequential
quadratic
programming,
convex
approximation,
difference-of-convex
programming
techniques.
Through
comprehensive
numerical
evaluations,
validate
effectiveness
mathematical
demonstrate
superiority
our
over
benchmark
schemes.
results
showcase
notable
performance
improvements
terms
SE,
thereby
highlighting
benefits
that
can
be
leveraging
approach
M-UAV
networks.
Future Internet,
Год журнала:
2024,
Номер
16(7), С. 226 - 226
Опубликована: Июнь 27, 2024
The
rapid
development
of
5G
networks
and
the
anticipation
6G
technologies
have
ushered
in
an
era
highly
customizable
network
environments
facilitated
by
innovative
concept
slicing.
This
technology
allows
creation
multiple
virtual
on
same
physical
infrastructure,
each
optimized
for
specific
service
requirements.
Despite
its
numerous
benefits,
slicing
introduces
significant
security
vulnerabilities
that
must
be
addressed
to
prevent
exploitation
increasingly
sophisticated
cyber
threats.
review
explores
application
cutting-edge
technologies—Artificial
Intelligence
(AI),
specifically
Machine
Learning
(ML),
Software-Defined
Networking
(SDN),
Network
Functions
Virtualization
(NFV)—in
crafting
advanced
solutions
tailored
AI’s
predictive
threat
detection
automated
response
capabilities
are
analysed,
highlighting
role
maintaining
integrity
resilience.
Meanwhile,
SDN
NFV
scrutinized
their
ability
enforce
flexible
policies
manage
functionalities
dynamically,
thereby
enhancing
adaptability
measures
meet
evolving
demands.
Thoroughly
examining
current
literature
industry
practices,
this
paper
identifies
critical
research
gaps
frameworks
proposes
solutions.
We
advocate
a
holistic
strategy
integrating
ML,
SDN,
enhance
data
confidentiality,
integrity,
availability
across
slices.
concludes
with
future
directions
develop
robust,
scalable,
efficient
capable
supporting
safe
deployment
next-generation
networks.
Internet Technology Letters,
Год журнала:
2025,
Номер
8(3)
Опубликована: Март 28, 2025
ABSTRACT
6G
networks
provide
high
data
rates,
low
latency,
and
massive
connectivity
but
face
security
challenges
due
to
the
integration
of
communication,
sensing,
AI.
Traditional
threat
detection
systems
struggle
handle
complex
interactions
between
dynamic
network
topologies
high‐speed
flows
in
environments.
To
address
this,
we
propose
a
Spatiotemporal
Dual‐Stream
Transformer
framework
that
utilizes
parallel
graph‐based
sequence‐based
attention
mechanisms
for
real‐time
threats
such
as
cross‐domain
lateral
attacks,
large‐scale
DDoS,
sensor
exploitation.
Experimental
results
simulated
environment
show
an
anomaly
accuracy
93.6%
end‐to‐end
inference
latency
only
8.2
ms,
while
prototype
testing
achieves
92.4%
rate
0‐day
exploits.
These
establish
technical
foundation
critical
insights
evolution
intelligent,
secure
networks.
WSEAS TRANSACTIONS ON COMMUNICATIONS,
Год журнала:
2025,
Номер
24, С. 7 - 10
Опубликована: Апрель 14, 2025
Security
slicing
in
contemporary
networks
is
a
powerful
tool
that
can
serve
operators
to
deliver
more
secure,
reliable,
and
efficient
network
extension.
In
order
ensure
secure
deployment
implementation,
it
necessary
build
corresponding
security
framework
contains
threats,
requirements,
recommendations.
On
the
other
hand,
by
segmenting
network,
allocate
resources
effectively
provide
customized
optimal
experience
for
users.
This
work
illustrates
security.
After
an
introductory
presentation,
illustration
of
considerations
provided.
The
next
two
sessions
addressed
influence
artificial
intelligence
closed-loop
automation.
Further,
role
future
research
consideration
together
with
operated
achievements
are
demonstrated.
final
session
referred
concluding
remarks.
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems,
Год журнала:
2024,
Номер
11(1)
Опубликована: Янв. 16, 2024
Secured
broadband
radio
communications
are
becoming
increasingly
pivotal
for
high-speed
connectivity
in
access
networks,
playing
a
crucial
role
both
mobile
information
systems
and
wireless
IoT
connections.
This
paper
introduces
chaos-based
two-channel
digital
communication
system
utilizing
fiber
optic
transmission
technology.
The
comprises
two
channels
operating
at
up
to
1
Gbps
using
amplitude
shift
keying
(ASK)
modulation,
followed
by
modulation
with
chaotic
sequence
before
conversion
the
optical
domain
MZM
modulator.
To
compensate
loss,
utilizes
an
Erbium
Doped
Fiber
Amplifier
(EDFA)
employs
links
through
standard
ITU-G.655
fibers.
Numerical
simulation
of
designed
is
performed
commercialized
software
Optisystem
V.15
assess
characterize
performance.
results
demonstrate
system’s
effective
operation
on
distance
110
km,
maintaining
bit
error
ratio
less
than
10−9.
feature
ensures
reliable
performance
connections,
particularly
applications
such
as
fronthaul
networks
cloud
sensor
network
IEEE Communications Surveys & Tutorials,
Год журнала:
2024,
Номер
26(4), С. 2836 - 2866
Опубликована: Янв. 1, 2024
Network
Slicing
(NS)
is
one
of
the
pillars
fifth/sixth
generation
(5G/6G)
mobile
networks.
It
provides
means
for
Mobile
Operators
(MNOs)
to
leverage
physical
infrastructure
across
different
technological
domains
support
applications.
This
survey
analyzes
progress
made
on
NS
resource
management
these
domains,
with
a
focus
interdependence
between
and
unique
issues
that
arise
in
cross-domain
End-to-End
(E2E)
settings.
Based
generic
problem
formulation,
functionalities
(e.g.,
allocation
orchestration)
are
examined
revealing
their
limits
when
applied
separately
per
domain.
The
appropriateness
problem-solving
methodologies
critically
analyzed,
practical
insights
provided,
explaining
how
should
be
rethought
E2E
contexts.
Furthermore,
latest
advancements
reported
through
detailed
analysis
most
relevant
research
projects
experimental
testbeds.
Finally,
core
facing
dissected,
pertinent
directions
identified,
providing
guidelines
new
researchers.