References
- M. T. OMERANI Hanane, "4G and 5G: Security and privacy analysis".
- Y. Q. a. R. Q. H. DONGFENG FANG, "Security for 5G Mobile Wireless Networks," IEEE, 2017.
- A. B. S. A. P. K. M. C. S. SULLIVAN, "5G Security Challenges and Solutions: A Review by OSI Layers," IEEE, 2021.
- T. K. M. L. J. O. M. Y. A. G. Ijaz Ahmad, "Overview of 5G Security Challenges and Solutions," ResearchGate, 2018.
- D. Q. H. a. A. D. Areej Alsini, "Hashtag Recommendation Methods for Twitter and Sina Weibo:A Review," MDPI, 2021.
- M. L. X. L. Xiaoling Xu, "Key technology and application ofmillimeter wave communications for 5G: a survey," Springer, 2018.
- WIKIPEDIA, "Heterogeneous network," [Online]. Available: https://en.wikipedia.org/wiki/Heterogeneous_network. [Accessed 19 4 2022].
- S. R. S. K. S. M. M. S. A. E. A. T. W. K. Y. P. a. J. H. P. Jin Ho Park, "A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions," hcisijournal, 2021.
- G. NGMN Alliance, "5G Security Recommendations Package #1," 2016.
- N. D. a. V. L. M. Conti, "A survey of man in the middle attacks," IEEE, 2016.
- M. L. ,. K. J. M. AN BRAEKEN, "Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks," IEEE, 2019.
- M. N. a. G. S. E. Dubrova, "CRC-based message authentication for 5G mobile technology," IEEE, 2015.
- T. J. Jing YANG, "An overview of cryptographic primitives for possible use in 5G and beyond," SCIENCE CHINA, 2020.
- M. B. Nicholas J H, "Secure human identification protocols," Springer, 2001.
- L. H. J. C. A. X. C. HAIOU HUANG, "An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks," IEEE, 2019.
- Z. Z. D. Z. F. P. &. L. H. MA Zheng, "Key techniques for 5G wireless communications:network architecture, physical layer,and MAC layer perspectives," SCIENCE CHINA, 2015.
- Y. L. Jingfeng Zhao, "Supply chain security evaluation model and index system based on a 5G information system," Springer, 2021.
- P. M. S. S. A. L. J. F. H. M. G. P. S. S. H. C. G. M. P. Jose Maria Jorquera Valero, "Design of a Security and Trust Framework for 5G," Journal of Network and Systems Management, 2021.
- S. A. Alghamdi, "Novel trust-aware intrusion detection and prevention system for 5G," Springer, 2021.
- P.-H. L. a. E. J. A. Zappone, IEEE, 2016.
- Y. S. J. a. J. H. P. S. K. Singh, "A deep learning-based IoT-oriented infrastructure for secure smart City," Sustainable Cities and Society, 2020.
- Z. D. a. K. A. M. A. Abro, "A Lightweight elliptic-ElGamal-based authentication scheme for secure device-to-device communication," Future Internet, 2019.
- H. S.-C. M. Yosra Benslimen, "Attacks and failures prediction framework for acollaborative 5G mobile network," Springer, 2021.