An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks DOI Creative Commons
Fahad Alotaibi,

Ramesh K. Karne,

Alexander L. Wijesinha

и другие.

Journal of Cybersecurity and Privacy, Год журнала: 2024, Номер 4(3), С. 678 - 730

Опубликована: Сен. 18, 2024

The Internet has become the primary vehicle for doing almost everything online, and smartphones are needed everyone to live their daily lives. As a result, cybersecurity is top priority in today’s world. usage grown exponentially with billions of users proliferation Things (IoT) devices, cat-and-mouse game between attackers defenders. Cyberattacks on systems commonplace, defense mechanisms continually updated prevent them. Based literature review vulnerabilities, attacks, preventive measures, we find that problems rooted computer system architectures, operating systems, network protocols, design options, heterogeneity, complexity, evolution, open open-source software user convenience, ease access, global users, advertisements, business needs, market. We investigate common vulnerabilities bare machine computing (BMC) paradigm possible solution address eliminate root causes at many levels. study 22 cyberattacks, identify causes, currently used compare conventional characteristics evaluate BMC its applications respect these attacks. Our finds resilient most except few physical also have inherent security all information Further research validate strengths applications.

Язык: Английский

Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions DOI Open Access
Mishri Saleh Al-Marshoud, Mehmet Sabır Kiraz, Ali H. Al-Bayati

и другие.

ACM Computing Surveys, Год журнала: 2024, Номер 56(10), С. 1 - 39

Опубликована: Апрель 10, 2024

Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the network diverse, dynamic, large-scale, making it difficult to meet 5G network’s demanding requirements. Decentralized systems interesting provide attractive because they publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points failure, enable distributed key management communication in a peer-to-peer network. Researchers dedicated substantial efforts advancing vehicle communications, however conventional cryptographic mechanisms insufficient which enabled us look at decentralized technologies. Therefore, we revisit approaches with VANETs. Endpoint devices hold wallet may incorporate threshold methods like MPC wallets, HD Wallets, or multi-party ECDSA/EdDSA/BLS. We also discuss trust demonstrate how decentralization can improve integrity, security, privacy, resilience failure. conduct comprehensive review, comparing them current requirements, latest authentication secure architectures, require involvement trusted but non-transparent authorities certificate issuance/revocation. highlight limitations these schemes from PKI deployment recommend future research, particularly realm quantum cryptography.

Язык: Английский

Процитировано

22

IoT‐5G and B5G/6G resource allocation and network slicing orchestration using learning algorithms DOI Creative Commons
Ado Adamou Abba Ari,

Faustin Samafou,

Arouna Ndam Njoya

и другие.

IET Networks, Год журнала: 2025, Номер 14(1)

Опубликована: Янв. 1, 2025

Abstract The advent of 5G networks has precipitated an unparalleled surge in demand for mobile communication services, propelled by the sophisticated wireless technologies. An increasing number countries are moving from fourth generation (4G) to fifth (5G) networks, creating a new expectation services that dynamic, transparent, and differentiated. It is anticipated these will be adapted multitude use cases become standard practice. diversity increasingly complex network infrastructures present significant challenges, particularly management resources orchestration services. Network Slicing emerging as promising approach address it facilitates efficient Resource Allocation (RA) supports self‐service capabilities. However, effective segmentation implementation requires development robust algorithms guarantee optimal RA. In this regard, artificial intelligence machine learning (ML) have demonstrated their utility analysis large datasets facilitation intelligent decision‐making processes. certain ML methodologies limited ability adapt evolving environments characteristic beyond (B5G/6G). This paper examines specific challenges associated with evolution B5G/6G particular focus on solutions RA dynamic slicing requirements. Moreover, article presents potential avenues further research domain objective enhancing efficiency next‐generation through adoption innovative technological solutions.

Язык: Английский

Процитировано

1

Optimizing User Association, Power Control and Beamforming for 6G Multi-IRS Multi-UAV NOMA Communications in Smart Cities DOI
Nabila Sehito, Shouyi Yang,

Haya Mesfer Alshahrani

и другие.

IEEE Transactions on Consumer Electronics, Год журнала: 2024, Номер 70(3), С. 5702 - 5710

Опубликована: Апрель 15, 2024

Sixth generation (6G)-enabled smart cities with intelligent reconfigurable surfaces (IRSs), unmanned aerial vehicles (UAVs), and non-orthogonal multiple access (NOMA) technologies have the potential to transform consumer electronics through ultra-fast wireless connectivity, effective resource utilization, urban services. This paper presents a new optimization scheme in NOMA multi-UAV (M-UAV) networks by utilizing IRSs. The proposed focuses on ground user equipment (GUE) UAV association, power allocation IRS passive beamforming (BF), objective of enhancing system's spectral efficiency (SE) under assumption imperfect successive interference cancellation (i-SIC). To tackle non-linearity problem, we first perform GUE association for available BF. Then, decouple joint transmit BF design problem into two parts. Subsequently, an efficient solution is achieved employing combination sequential quadratic programming, convex approximation, difference-of-convex programming techniques. Through comprehensive numerical evaluations, validate effectiveness mathematical demonstrate superiority our over benchmark schemes. results showcase notable performance improvements terms SE, thereby highlighting benefits that can be leveraging approach M-UAV networks.

Язык: Английский

Процитировано

6

Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies DOI Creative Commons
José Cunha, Pedro Ferreira, Eva M. Castro Barbero

и другие.

Future Internet, Год журнала: 2024, Номер 16(7), С. 226 - 226

Опубликована: Июнь 27, 2024

The rapid development of 5G networks and the anticipation 6G technologies have ushered in an era highly customizable network environments facilitated by innovative concept slicing. This technology allows creation multiple virtual on same physical infrastructure, each optimized for specific service requirements. Despite its numerous benefits, slicing introduces significant security vulnerabilities that must be addressed to prevent exploitation increasingly sophisticated cyber threats. review explores application cutting-edge technologies—Artificial Intelligence (AI), specifically Machine Learning (ML), Software-Defined Networking (SDN), Network Functions Virtualization (NFV)—in crafting advanced solutions tailored AI’s predictive threat detection automated response capabilities are analysed, highlighting role maintaining integrity resilience. Meanwhile, SDN NFV scrutinized their ability enforce flexible policies manage functionalities dynamically, thereby enhancing adaptability measures meet evolving demands. Thoroughly examining current literature industry practices, this paper identifies critical research gaps frameworks proposes solutions. We advocate a holistic strategy integrating ML, SDN, enhance data confidentiality, integrity, availability across slices. concludes with future directions develop robust, scalable, efficient capable supporting safe deployment next-generation networks.

Язык: Английский

Процитировано

6

Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing DOI
Jaehyoung Park, Jihye Kim, Jong‐Hyouk Lee

и другие.

Lecture notes in computer science, Год журнала: 2025, Номер unknown, С. 111 - 122

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Security Considerations for 5G Network Slicing DOI
Carlos D. Aguilar-Mora, Rodolfo P. Merino-Vivanco

Lecture notes in networks and systems, Год журнала: 2025, Номер unknown, С. 317 - 322

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

A Spatiotemporal Transformer Framework for Robust Threat Detection in 6G Networks DOI Open Access

Guangbin Wu

Internet Technology Letters, Год журнала: 2025, Номер 8(3)

Опубликована: Март 28, 2025

ABSTRACT 6G networks provide high data rates, low latency, and massive connectivity but face security challenges due to the integration of communication, sensing, AI. Traditional threat detection systems struggle handle complex interactions between dynamic network topologies high‐speed flows in environments. To address this, we propose a Spatiotemporal Dual‐Stream Transformer framework that utilizes parallel graph‐based sequence‐based attention mechanisms for real‐time threats such as cross‐domain lateral attacks, large‐scale DDoS, sensor exploitation. Experimental results simulated environment show an anomaly accuracy 93.6% end‐to‐end inference latency only 8.2 ms, while prototype testing achieves 92.4% rate 0‐day exploits. These establish technical foundation critical insights evolution intelligent, secure networks.

Язык: Английский

Процитировано

0

Contemporary Network Slicing Security DOI Open Access

Zoran Miličević,

Zoran Bojković

WSEAS TRANSACTIONS ON COMMUNICATIONS, Год журнала: 2025, Номер 24, С. 7 - 10

Опубликована: Апрель 14, 2025

Security slicing in contemporary networks is a powerful tool that can serve operators to deliver more secure, reliable, and efficient network extension. In order ensure secure deployment implementation, it necessary build corresponding security framework contains threats, requirements, recommendations. On the other hand, by segmenting network, allocate resources effectively provide customized optimal experience for users. This work illustrates security. After an introductory presentation, illustration of considerations provided. The next two sessions addressed influence artificial intelligence closed-loop automation. Further, role future research consideration together with operated achievements are demonstrated. final session referred concluding remarks.

Язык: Английский

Процитировано

0

Design of A Chaos-based Digital Radio over Fiber Transmission Link using ASK Modulation for Wireless Communication Systems DOI Creative Commons

Vu Anh Dao,

Tran Tri Thanh Thuy,

Vo Nguyen Quoc Bao

и другие.

EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Год журнала: 2024, Номер 11(1)

Опубликована: Янв. 16, 2024

Secured broadband radio communications are becoming increasingly pivotal for high-speed connectivity in access networks, playing a crucial role both mobile information systems and wireless IoT connections. This paper introduces chaos-based two-channel digital communication system utilizing fiber optic transmission technology. The comprises two channels operating at up to 1 Gbps using amplitude shift keying (ASK) modulation, followed by modulation with chaotic sequence before conversion the optical domain MZM modulator. To compensate loss, utilizes an Erbium Doped Fiber Amplifier (EDFA) employs links through standard ITU-G.655 fibers. Numerical simulation of designed is performed commercialized software Optisystem V.15 assess characterize performance. results demonstrate system’s effective operation on distance 110 km, maintaining bit error ratio less than 10−9. feature ensures reliable performance connections, particularly applications such as fronthaul networks cloud sensor network

Язык: Английский

Процитировано

3

Resource Management From Single-Domain 5G to End-to-End 6G Network Slicing: A Survey DOI
Sina Ebrahimi, Faouzi Bouali, Olivier Haas

и другие.

IEEE Communications Surveys & Tutorials, Год журнала: 2024, Номер 26(4), С. 2836 - 2866

Опубликована: Янв. 1, 2024

Network Slicing (NS) is one of the pillars fifth/sixth generation (5G/6G) mobile networks. It provides means for Mobile Operators (MNOs) to leverage physical infrastructure across different technological domains support applications. This survey analyzes progress made on NS resource management these domains, with a focus interdependence between and unique issues that arise in cross-domain End-to-End (E2E) settings. Based generic problem formulation, functionalities (e.g., allocation orchestration) are examined revealing their limits when applied separately per domain. The appropriateness problem-solving methodologies critically analyzed, practical insights provided, explaining how should be rethought E2E contexts. Furthermore, latest advancements reported through detailed analysis most relevant research projects experimental testbeds. Finally, core facing dissected, pertinent directions identified, providing guidelines new researchers.

Язык: Английский

Процитировано

3