Cited 66 time in
A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Jin Ho | - |
| dc.contributor.author | Rathore, Shailendra | - |
| dc.contributor.author | Singh, Sushil Kumar | - |
| dc.contributor.author | Salim, Mikail Mohammed | - |
| dc.contributor.author | El Azzaoui, Abir | - |
| dc.contributor.author | Kim, Tae Woo | - |
| dc.contributor.author | Pan, Yi | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.date.accessioned | 2023-04-27T19:40:33Z | - |
| dc.date.available | 2023-04-27T19:40:33Z | - |
| dc.date.issued | 2021-01-29 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/5438 | - |
| dc.description.abstract | With the advancement of information and communication technologies, fifth-generation (5G) has become an emerging communication medium to support higher speed, lower latency, and massive connectivity to various devices by leveraging the evolution of 4G with the addition of new radio technology, service-based architecture, and cloud infrastructure. Nonetheless, the introduction of new technologies and advanced features in 5G communicationsgives rise to new security requirements and challenges. This paper presents a comprehensive survey of various threats and solutions toward ensuring 5G security and privacy. The recent development and existing schemes of 5G wireless security are offered based on the corresponding security services, including authentication, availability, data confidentiality, integrity, and non-repudiation. We will also discussthe different emerging technologies applied to 5G, such as Blockchain, software defined networking, artificial intelligence, cyber-physical system, mobile edge computing, device-to-device (D2D) communication, and Industry 4.0. Inspired by these security research and development activities in the emerging technologies, we present various applications and services of 5Gconsidering the security requirements and solutions. The challenges and future directions of 5G wireless security are finally summarized. | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | KOREA INFORMATION PROCESSING SOC | - |
| dc.title | A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.22967/HCIS.2021.11.003 | - |
| dc.identifier.scopusid | 2-s2.0-85124677908 | - |
| dc.identifier.wosid | 000668117100003 | - |
| dc.identifier.bibliographicCitation | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, v.11 | - |
| dc.citation.title | HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES | - |
| dc.citation.volume | 11 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordPlus | ANOMALY DETECTION | - |
| dc.subject.keywordPlus | NEXT-GENERATION | - |
| dc.subject.keywordPlus | NETWORKS | - |
| dc.subject.keywordPlus | BLOCKCHAIN | - |
| dc.subject.keywordPlus | AUTHENTICATION | - |
| dc.subject.keywordPlus | CHALLENGES | - |
| dc.subject.keywordPlus | EFFICIENT | - |
| dc.subject.keywordPlus | ALGORITHM | - |
| dc.subject.keywordPlus | SYSTEM | - |
| dc.subject.keywordPlus | IMPLEMENTATION | - |
| dc.subject.keywordAuthor | 5G Security | - |
| dc.subject.keywordAuthor | Blockchain | - |
| dc.subject.keywordAuthor | Artificial Intelligence | - |
| dc.subject.keywordAuthor | Communication Technologies | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
