Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions.
IEEE Communications Standards Magazine, 2(1), 36–43.
https://doi.org/10.1109/MCOMSTD.2018.1700063
Amiriara, H., & Zahabi, M. R. (2023). A low complexity near-optimal detector based on teaching–learning algorithm for massive MIMO.
Journal of Engineering Management and Soft Computing (JEMSC), 9(17), 35–49.
https://doi.org/10.22091/jemsc.2024.8730.1167
Chen, C.-L., Chiang, M.-L., Hsieh, H.-C., Liu, C.-C., & Deng, Y.-Y. (2020). A lightweight mutual authentication with wearable device in location-based mobile edge computing.
Wireless Personal Communications, 113, 575–598.
https://doi.org/10.1007/s11277-020-07240-2
European Union Agency for Cybersecurity (ENISA) (2020). ENISA threat landscape for 5G networks.
Publications Office of the European Union.
https://doi.org/10.2824/802229
European Union Agency for Cybersecurity (ENISA). (2023).
ENISA threat landscape. Publications Office of the European Union.
https://doi.org/10.2824/782573
Gao, Y., Ranasinghe, D. C., Al‑Sarawi, S. F., Kavehei, O., & Abbott, D. (2016). Emerging physical unclonable functions with nanotechnology.
IEEE Access, 4, 61–80.
https://doi.org/10.1109/ACCESS.2015.2503432
Huang, W., Shuai, B., Zhang, R., Xu, M., Xu, Y., Yu, Y., & Antwi, E. (2020). A new system risk definition and system risk analysis approach based on improved risk field.
IEEE Transactions on Reliability, 69(4), 1437–1452.
https://doi.org/10.1109/TR.2019.2946571
Idowu-Bismark, O., Kennedy, O., Husbands, R., & Adedokun, M. (2019). 5G wireless communication network architecture and its key enabling technologies. International Review of Aerospace Engineering (I.RE.AS.E.), 12(2), 70–82.
Javed, A. R., Beg, M. O., Asim, M., Baker, T., & Al‑Bayatti, A. H. (2023). AlphaLogger: Detecting motion‑based side‑channel attacks using smartphone keystrokes.
Journal of Ambient Intelligence and Humanized Computing, 14, 4869–4882.
https://doi.org/10.1007/s12652-020-01770-0
Krupp, B., Sridhar, N., & Zhao, W. (2017). SPE: Security and privacy enhancement framework for mobile devices.
IEEE Transactions on Dependable and Secure Computing, 14(4), 433–446.
https://doi.org/10.1109/TDSC.2015.2465965
Kuhestani, A., Sebtonabi, M. A., Rajabi, R., & Keshavarzi, M. R. (2024). Secure medical image transmission for healthcare applications using cooperative relaying based on physical layer security.
Journal of Engineering Management and Soft Computing, 10(18), 213–237.
https://doi.org/10.22091/jemsc.2024.11195.1199
Kumar, T., Porambage, P., Ahmad, I., Liyanage, M., Harjula, E., & Ylianttila, M. (2018). Securing gadget-free digital services.
Computer, 51(11), 66–77.
https://doi.org/10.1109/MC.2018.2876017
Liyanage, M., Braeken, A., Shahabuddin, S., & Ranaweera, P. (2023). Open RAN security: Challenges and opportunities.
Journal of Network and Computer Applications, 214, Article 103621.
https://doi.org/10.1016/j.jnca.2023.103621
Mushtaq, M., Akram, A., Bhatti, M. K., Rais, R. N. B., Lapotre, V., & Gogniat, G. (2018). Run‑time detection of Prime+Probe side‑channel attack on AES encryption algorithm. In
Proceedings of the IEEE Global Information Infrastructure and Networking Symposium (GIIS) (pp. 1–5). IEEE.
https://doi.org/10.1109/GIIS.2018.8635767
Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., & Taleb, T. (2018). Survey on multi-access edge computing for Internet of Things realization.
IEEE Communications Surveys & Tutorials, 20(4), 2961–2991.
https://doi.org/10.1109/COMST.2018.2849509
Ragheb, M., Kuhestani, A., Kazemi, M., Ahmadi, H., & Hanzo, L. (2024). RIS‑aided secure millimeter‑wave communication under RF‑chain impairments.
IEEE Transactions on Vehicular Technology, 73(1), 952–963.
https://doi.org/10.1109/TVT.2023.3307451
Ragheb, M., Kuhestani, A., & Safavi Hemami, S. M. (2022). Joint beamforming and artificial noise design in secure millimeter‑wave communications with the aid of intelligent reflecting surfaces.
Journal of Iranian Association of Electrical and Electronics Engineers, 19(3), 55–62.
https://doi.org/10.52547/jiaeee.19.3.55
Ragheb, M., Safavi Hemami, S. M., Kuhestani, A., Ng, D. W. K., & Hanzo, L. (2021). On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach.
IEEE Transactions on Information Forensics and Security, 17, 53–68.
https://doi.org/10.1109/TIFS.2021.3131028
Ranaweera, P., Jurcut, A. D., Liyanage, M., & Liyanage, M. (2021). Survey on multi-access edge computing security and privacy.
IEEE Communications Surveys & Tutorials, 23(2), 1078–1124.
https://doi.org/10.1109/COMST.2021.3062546
Rezaeizadeh, S., & Bekran, M. (2023). Minimum variance beamforming based on covariance matrix reconstruction using orthogonal vectors. Journal of Engineering Management and Soft Computing (JEMSC), 9(16), 90–107.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges.
Future Generation Computer Systems, 78, 680–698.
https://doi.org/10.1016/j.future.2016.11.009
Sabbagh, M., Fei, Y., Wahl, T., & Ding, A. A. (2018). SCADET: A side‑channel attack detection tool for tracking Prime+Probe. In
Proceedings of the International Conference on Computer‑Aided Design (ICCAD) (pp. 1–8). Association for Computing Machinery.
https://doi.org/10.1145/3240765.3240844
Wang, H.-M., Zheng, T.-X., Yuan, J., Towsley, D., & Lee, M. H. (2016). Physical layer security in heterogeneous cellular networks.
IEEE Transactions on Communications, 64(3), 1204–1219.
https://doi.org/10.1109/TCOMM.2016.2519402
Wang, S., Zhao, Y., Xu, J., Yuan, J., & Hsu, C.-H. (2019). Edge server placement in mobile edge computing.
Journal of Parallel and Distributed Computing, 127, 160–168.
https://doi.org/10.1016/j.jpdc.2018.06.008
Wang, X., et al. (2018). Deep learning‑based classification and anomaly detection of side‑channel signals. In
Proceedings of SPIE – Cyber Sensing (Vol. 10630, Article 1063006). SPIE.
https://doi.org/10.1117/12.2311329
Yu, P., Cao, J., Ma, M., Li, H., Niu, B., & Li, F. (2019). Quantum-resistance authentication and data transmission scheme for NB‑IoT in 3GPP 5G networks. In
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–7). IEEE.
https://doi.org/10.1109/WCNC.2019.8885686
Send comment about this article