Skip to main content

2024 | OriginalPaper | Buchkapitel

Ensuring IoT Security in 5G Era: Examining Protocols, Architectures, and Security Measures

verfasst von : Poonam Tiwari, Nidhi Sharma, Swati Chudhary, Vishant Gahlaut

Erschienen in: Advances in Photonics and Electronics

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The incorporation of the Internet of Things (IoT) with Fifth Generation (5G) networks offers extensive opportunities for connectivity and data exchange, yet poses significant security challenges. This research conducts a thorough analysis of protocols, architectures, and security measures for safeguarding IoT devices in the dynamic 5G landscape. A literature review highlights current IoT security states in 5G, identifying gaps. The work explores communication protocols, focusing on Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP), evaluating efficiency, scalability, and security for reliable IoT connectivity. Various network architectures, including centralized, decentralized, and hybrid models, are examined for their impact on IoT communication and security. Security challenges in 5G IoT, along with existing measures like authentication and encryption, are assessed to guide enhancements. Practical experiments validate theoretical findings, offering insights into real-world applicability. The research concludes with recommendations to fortify IoT connectivity in 5G and anticipates future developments in sixth-generation (6G) networks, emphasizing a trustworthy IoT ecosystem. This work endeavors to establish a groundwork for researchers, practitioners, and policymakers to tackle the urgent requirement of securing IoT devices amidst the advent of 5G technology, thereby nurturing a robust ecosystem for various applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat A.M. Abuagoub, IoT security evolution: challenges and countermeasures review. Int. J. Commun. Netw. Inf. Secur. 11(3), 342–351 (2019) A.M. Abuagoub, IoT security evolution: challenges and countermeasures review. Int. J. Commun. Netw. Inf. Secur. 11(3), 342–351 (2019)
Zurück zum Zitat A.H. Ahmed, N.M. Omar, H.M. Ibrahim, Modern IoT architectures review: A security perspective. In Proceedings of 8th Annual International Conference in ICT: Big Data, Cloud Security (pp. 73–81) (2017) A.H. Ahmed, N.M. Omar, H.M. Ibrahim, Modern IoT architectures review: A security perspective. In Proceedings of 8th Annual International Conference in ICT: Big Data, Cloud Security (pp. 73–81) (2017)
Zurück zum Zitat S.F. Ahmed, M.S.B. Alam, S. Afrin, S.J. Rafa, S.B. Taher, M. Kabir, A.H. Gandomi, Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities. IEEE Access (2024) S.F. Ahmed, M.S.B. Alam, S. Afrin, S.J. Rafa, S.B. Taher, M. Kabir, A.H. Gandomi, Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities. IEEE Access (2024)
Zurück zum Zitat S. Alam, S.T. Siddiqui, A. Ahmad, R. Ahmad, M. Shuaib, Internet of things (IoT) enabling technologies, requirements, and security challenges, in Advances in Data and Information Sciences: Proceedings of ICDIS 2019 (pp. 119–126). Springer Singapore (2020) S. Alam, S.T. Siddiqui, A. Ahmad, R. Ahmad, M. Shuaib, Internet of things (IoT) enabling technologies, requirements, and security challenges, in Advances in Data and Information Sciences: Proceedings of ICDIS 2019 (pp. 119–126). Springer Singapore (2020)
Zurück zum Zitat M. Alam, N. Ahmed, R. Matam, F.A. Barbhuiya, Analysing the suitability of IEEE 802.11 ah for next generation Internet of Things: A comparative study. Ad Hoc Networks, 103437 (2024) M. Alam, N. Ahmed, R. Matam, F.A. Barbhuiya, Analysing the suitability of IEEE 802.11 ah for next generation Internet of Things: A comparative study. Ad Hoc Networks, 103437 (2024)
Zurück zum Zitat M.N. Alanazi, 5G security threat landscape, AI and blockchain. Wirel. Pers. Commun., 1–16 (2024) M.N. Alanazi, 5G security threat landscape, AI and blockchain. Wirel. Pers. Commun., 1–16 (2024)
Zurück zum Zitat N. Alhirabi, O. Rana, C. Perera, Security and privacy requirements for the internet of things: A survey. ACM Trans. Internet Things 2(1), 1–37 (2021)CrossRef N. Alhirabi, O. Rana, C. Perera, Security and privacy requirements for the internet of things: A survey. ACM Trans. Internet Things 2(1), 1–37 (2021)CrossRef
Zurück zum Zitat R. Ande, B. Adebisi, M. Hammoudeh, J. Saleem, Internet of Things: Evolution and technologies from a security perspective. Sustain. Cities Soc. 54, 101728 (2020)CrossRef R. Ande, B. Adebisi, M. Hammoudeh, J. Saleem, Internet of Things: Evolution and technologies from a security perspective. Sustain. Cities Soc. 54, 101728 (2020)CrossRef
Zurück zum Zitat F. Assaderaghi, G. Chindalore, B. Ibrahim, H. de Jong, M. Joye, S. Nassar, T. Wille, Privacy and security: Key requirements for sustainable IoT growth, in 2017 Symposium on VLSI Technology (pp. T8-T13). IEEE (2017) F. Assaderaghi, G. Chindalore, B. Ibrahim, H. de Jong, M. Joye, S. Nassar, T. Wille, Privacy and security: Key requirements for sustainable IoT growth, in 2017 Symposium on VLSI Technology (pp. T8-T13). IEEE (2017)
Zurück zum Zitat F. Author, Article Title. Journal 2(5), 99–110 (2016) F. Author, Article Title. Journal 2(5), 99–110 (2016)
Zurück zum Zitat W. Bekri, R. Jmal, L.C. Fourati, Secure and trustworthiness IoT systems: investigations and literature review. Telecommun. Syst. 1–36 (2024) W. Bekri, R. Jmal, L.C. Fourati, Secure and trustworthiness IoT systems: investigations and literature review. Telecommun. Syst. 1–36 (2024)
Zurück zum Zitat T. Beyrouthy, N. Mostafa, A. Roshdy, A.S. Karar, S. Alkork, Review of EEG-based biometrics in 5G-IoT: current trends and future prospects. Appl. Sci. 14(2), 534 (2024)CrossRef T. Beyrouthy, N. Mostafa, A. Roshdy, A.S. Karar, S. Alkork, Review of EEG-based biometrics in 5G-IoT: current trends and future prospects. Appl. Sci. 14(2), 534 (2024)CrossRef
Zurück zum Zitat S. Daousis, N. Peladarinos, V. Cheimaras, P. Papageorgas, D.D. Piromalis, R.A. Munteanu, Overview of protocols and standards for wireless sensor networks in critical infrastructures. Future Internet 16(1), 33 (2024)CrossRef S. Daousis, N. Peladarinos, V. Cheimaras, P. Papageorgas, D.D. Piromalis, R.A. Munteanu, Overview of protocols and standards for wireless sensor networks in critical infrastructures. Future Internet 16(1), 33 (2024)CrossRef
Zurück zum Zitat F. Eusufzai, A.N. Bobby, F. Shabnam, S.R. Sabuj, Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends. Int. J. Intell. Netw. (2024) F. Eusufzai, A.N. Bobby, F. Shabnam, S.R. Sabuj, Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends. Int. J. Intell. Netw. (2024)
Zurück zum Zitat M.U. Farooq, M. Waseem, S. Mazhar, A. Khairi, T. Kamal, A review on internet of things (IoT). Int. J. Comput. Appl. 113(1), 1–7 (2015) M.U. Farooq, M. Waseem, S. Mazhar, A. Khairi, T. Kamal, A review on internet of things (IoT). Int. J. Comput. Appl. 113(1), 1–7 (2015)
Zurück zum Zitat H. HaddadPajouh, A. Dehghantanha, R.M. Parizi, M. Aledhari, H. Karimipour, A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14, 100129 (2021)CrossRef H. HaddadPajouh, A. Dehghantanha, R.M. Parizi, M. Aledhari, H. Karimipour, A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14, 100129 (2021)CrossRef
Zurück zum Zitat S. Hameed, F.I. Khan, B. Hameed, Understanding security requirements and challenges in Internet of Things (IoT): A review. J. Comput. Netw. Commun. 2019, 1–14 (2019)CrossRef S. Hameed, F.I. Khan, B. Hameed, Understanding security requirements and challenges in Internet of Things (IoT): A review. J. Comput. Netw. Commun. 2019, 1–14 (2019)CrossRef
Zurück zum Zitat P. Hemashree, V. Kavitha, S.B. Mahalakshmi, K. Praveena, R. Tarunika, Machine learning approaches in blockchain technology-based IoT security: An investigation on current developments and open challenges, in Blockchain Transformations: Navigating the Decentralized Protocols Era (pp. 107–130). Cham: Springer Nature Switzerland, (2024) P. Hemashree, V. Kavitha, S.B. Mahalakshmi, K. Praveena, R. Tarunika, Machine learning approaches in blockchain technology-based IoT security: An investigation on current developments and open challenges, in Blockchain Transformations: Navigating the Decentralized Protocols Era (pp. 107–130). Cham: Springer Nature Switzerland, (2024)
Zurück zum Zitat M. Henry, M. Maji, Securing the Internet of Things (IoT): Addressing cybersecurity challenges and implementing protective measures (No. 11840). EasyChair (2024) M. Henry, M. Maji, Securing the Internet of Things (IoT): Addressing cybersecurity challenges and implementing protective measures (No. 11840). EasyChair (2024)
Zurück zum Zitat M.A. Iqbal, O.G. Olaleye, M.A. Bayoumi, A review on internet of things (IoT): security and privacy requirements and the solution approaches. Glob. J. Comput. Sci. Technol. 16(7), 1–10 (2016) M.A. Iqbal, O.G. Olaleye, M.A. Bayoumi, A review on internet of things (IoT): security and privacy requirements and the solution approaches. Glob. J. Comput. Sci. Technol. 16(7), 1–10 (2016)
Zurück zum Zitat W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, Y.A. Bangash, An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020)CrossRef W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, Y.A. Bangash, An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250–10276 (2020)CrossRef
Zurück zum Zitat M. Islam, H.M.M. Jamil, S.A. Pranto, R.K. Das, A. Amin, A. Khan, Future industrial applications: Exploring LPWAN-Driven Iot Protocols (2024) M. Islam, H.M.M. Jamil, S.A. Pranto, R.K. Das, A. Amin, A. Khan, Future industrial applications: Exploring LPWAN-Driven Iot Protocols (2024)
Zurück zum Zitat R. Jain, P. Tiwari, P. Jain, R. Ramasamy, J.S. Imran, S. Udhayanan, Internet of Things (IoT) technology: A critical component of industry 4.0, in Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy (pp. 60–81). CRC Press R. Jain, P. Tiwari, P. Jain, R. Ramasamy, J.S. Imran, S. Udhayanan, Internet of Things (IoT) technology: A critical component of industry 4.0, in Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy (pp. 60–81). CRC Press
Zurück zum Zitat S. Jaiswal, D. Gupta, Security requirements for internet of things (IoT), in Proceedings of International Conference on Communication and Networks: ComNet 2016 (pp. 419–427). Springer Singapore (2017) S. Jaiswal, D. Gupta, Security requirements for internet of things (IoT), in Proceedings of International Conference on Communication and Networks: ComNet 2016 (pp. 419–427). Springer Singapore (2017)
Zurück zum Zitat S. Kalhoro, F.B. Shaikh, A. Kalhoro, J.U.R. Abbasi, R.K. Ayyasamy, An overview of security attacks in 5G enabled technologies: Applications and use case scenarios. ISeCure 16(1) (2024) S. Kalhoro, F.B. Shaikh, A. Kalhoro, J.U.R. Abbasi, R.K. Ayyasamy, An overview of security attacks in 5G enabled technologies: Applications and use case scenarios. ISeCure 16(1) (2024)
Zurück zum Zitat M. Kamalrudin, A.A. Ibrahim, S. Sidek, A security requirements library for the development of Internet of Things (IoT) applications, in Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium, APRES 2017, Melaka, Malaysia, November 9–10, 2017, Proceedings 4 (pp. 87–96). Springer Singapore (2018) M. Kamalrudin, A.A. Ibrahim, S. Sidek, A security requirements library for the development of Internet of Things (IoT) applications, in Requirements Engineering for Internet of Things: 4th Asia-Pacific Symposium, APRES 2017, Melaka, Malaysia, November 9–10, 2017, Proceedings 4 (pp. 87–96). Springer Singapore (2018)
Zurück zum Zitat N.H. Kamarudin, N.H.S. Suhaimi, F.A. Nor Rashid, M.N.A. Khalid, F. Mohd Ali, Exploring authentication paradigms in the internet of things: A comprehensive scoping review. Symmetry 16(2), 171 (2024)CrossRef N.H. Kamarudin, N.H.S. Suhaimi, F.A. Nor Rashid, M.N.A. Khalid, F. Mohd Ali, Exploring authentication paradigms in the internet of things: A comprehensive scoping review. Symmetry 16(2), 171 (2024)CrossRef
Zurück zum Zitat P. Krishnan, K. Jain, S.R. Poojara, S.N. Srirama, T. Pandey, R. Buyya, ESIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks. Comput. Commun. 216, 324–345 (2024)CrossRef P. Krishnan, K. Jain, S.R. Poojara, S.N. Srirama, T. Pandey, R. Buyya, ESIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks. Comput. Commun. 216, 324–345 (2024)CrossRef
Zurück zum Zitat Li, S., Security requirements in IoT architecture. Securing the internet of things, 97–108 (2017) Li, S., Security requirements in IoT architecture. Securing the internet of things, 97–108 (2017)
Zurück zum Zitat U.K. Lilhore, S. Dalal, S. Simaiya, A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Comput. Secur. 136, 103560 (2024)CrossRef U.K. Lilhore, S. Dalal, S. Simaiya, A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Comput. Secur. 136, 103560 (2024)CrossRef
Zurück zum Zitat S. Madakam, V. Lake, V. Lake, V. Lake, Internet of Things (IoT): A literature review. J. Comput. Commun. 3(05), 164 (2015)CrossRef S. Madakam, V. Lake, V. Lake, V. Lake, Internet of Things (IoT): A literature review. J. Comput. Commun. 3(05), 164 (2015)CrossRef
Zurück zum Zitat P. Malhotra, Y. Singh, P. Anand, D.K. Bangotra, P.K. Singh, W.C. Hong, Internet of things: Evolution, concerns and security challenges. Sensors 21(5), 1809 (2021)CrossRef P. Malhotra, Y. Singh, P. Anand, D.K. Bangotra, P.K. Singh, W.C. Hong, Internet of things: Evolution, concerns and security challenges. Sensors 21(5), 1809 (2021)CrossRef
Zurück zum Zitat U.M. Mbanaso, G.A. Chukwudebe, Requirement analysis of IoT security in distributed systems, in 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) (pp. 777–781). IEEE (2017) U.M. Mbanaso, G.A. Chukwudebe, Requirement analysis of IoT security in distributed systems, in 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) (pp. 777–781). IEEE (2017)
Zurück zum Zitat P. Netinant, T. Utsanok, M. Rukhiran, S. Klongdee, Development and assessment of internet of things-driven smart home security and automation with voice commands. IoT 5(1), 79–99 (2024)CrossRef P. Netinant, T. Utsanok, M. Rukhiran, S. Klongdee, Development and assessment of internet of things-driven smart home security and automation with voice commands. IoT 5(1), 79–99 (2024)CrossRef
Zurück zum Zitat S.R. Oh, Y.G. Kim,Security requirements analysis for the IoT, in 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1–6). IEEE (2017) S.R. Oh, Y.G. Kim,Security requirements analysis for the IoT, in 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1–6). IEEE (2017)
Zurück zum Zitat K.T. Putra, A.Z. Arrayyan, N. Hayati, C. Damarjati, A. Bakar, H.C. Chen, A review on the application of internet of medical things in wearable personal health monitoring: A cloud-edge artificial intelligence approach. IEEE Access (2024) K.T. Putra, A.Z. Arrayyan, N. Hayati, C. Damarjati, A. Bakar, H.C. Chen, A review on the application of internet of medical things in wearable personal health monitoring: A cloud-edge artificial intelligence approach. IEEE Access (2024)
Zurück zum Zitat J. K. Rai, P. Kumar, A. Sawan, P. Tiwari, K. Anuragi, P. Ranjan, Compact reconfigurable multiband patch antenna with machine learning approach for Wi-Fi, WLAN, and C-band Application, in I3rd Asian Conference on Innovation in Technology (ASIANCON), 1–4. (2023) J. K. Rai, P. Kumar, A. Sawan, P. Tiwari, K. Anuragi, P. Ranjan, Compact reconfigurable multiband patch antenna with machine learning approach for Wi-Fi, WLAN, and C-band Application, in I3rd Asian Conference on Innovation in Technology (ASIANCON), 1–4. (2023)
Zurück zum Zitat K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Commun. Surv. & Tutor. 22(4), 2489–2520 (2020)CrossRef K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Commun. Surv. & Tutor. 22(4), 2489–2520 (2020)CrossRef
Zurück zum Zitat K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis, in Proceedings of the Workshop on Fog Computing and the IoT (pp. 56–63) (2019) K. Tange, M. De Donno, X. Fafoutis, N. Dragoni, Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis, in Proceedings of the Workshop on Fog Computing and the IoT (pp. 56–63) (2019)
Zurück zum Zitat S.N.P. Thippeswamy, A.P. Raghavan, M. Rajgopal, A. Sujith, Efficient network management and security in 5G enabled internet of things using deep learning algorithms. International Journal of Electrical and Computer Engineering (IJECE) 14(1), 1058–1070 (2024)CrossRef S.N.P. Thippeswamy, A.P. Raghavan, M. Rajgopal, A. Sujith, Efficient network management and security in 5G enabled internet of things using deep learning algorithms. International Journal of Electrical and Computer Engineering (IJECE) 14(1), 1058–1070 (2024)CrossRef
Zurück zum Zitat P. Tiwari, V. Gahlaut, M. Kaushik, A. Shastri, V. Arya, I. Elfergani, J. Rodriguez, Enhancing performance of millimeter wave MIMO antenna with a decoupling and common defected ground approach. Technologies 11(5), 142 (2023g)CrossRef P. Tiwari, V. Gahlaut, M. Kaushik, A. Shastri, V. Arya, I. Elfergani, J. Rodriguez, Enhancing performance of millimeter wave MIMO antenna with a decoupling and common defected ground approach. Technologies 11(5), 142 (2023g)CrossRef
Zurück zum Zitat P. Tiwari, V. Gahlaut, M. Kaushik, P. Rani, A. Shastri, B. Singh, Advancing 5G connectivity: a comprehensive review of MIMO antennas for 5G applications. Int. J. Antennas Propag. (2023) P. Tiwari, V. Gahlaut, M. Kaushik, P. Rani, A. Shastri, B. Singh, Advancing 5G connectivity: a comprehensive review of MIMO antennas for 5G applications. Int. J. Antennas Propag. (2023)
Zurück zum Zitat P. Tiwari, M. Kaushik, A. Shastri, V. Gahlaut, Two Element Microstrip-Fed Slot Loaded Millimeter Wave MIMO Antenna. In 2023 International Conference for Advancement in Technology (ICONAT), 1–5, (2023) P. Tiwari, M. Kaushik, A. Shastri, V. Gahlaut, Two Element Microstrip-Fed Slot Loaded Millimeter Wave MIMO Antenna. In 2023 International Conference for Advancement in Technology (ICONAT), 1–5, (2023)
Zurück zum Zitat P. Tiwari, V. Gahlaut, M. Kaushik, A. Shastri, G. Siddiqui, B. Singh, A high-frequency planar-configured millimeter-wave MIMO antenna for fifth-generation NR operations. Int. J. RF Microw. Comput.-Aided Eng. (2023) P. Tiwari, V. Gahlaut, M. Kaushik, A. Shastri, G. Siddiqui, B. Singh, A high-frequency planar-configured millimeter-wave MIMO antenna for fifth-generation NR operations. Int. J. RF Microw. Comput.-Aided Eng. (2023)
Zurück zum Zitat P. Tiwari, M. Kaushik, A. Shastri, V. Gahlaut, Design of a MIMO rectangular dielectric resonator antenna for 5G millimeter-wave communications, in 2023 IEEE Wireless Antenna and Microwave Symposium (WAMS) 1–6. (2023) P. Tiwari, M. Kaushik, A. Shastri, V. Gahlaut, Design of a MIMO rectangular dielectric resonator antenna for 5G millimeter-wave communications, in 2023 IEEE Wireless Antenna and Microwave Symposium (WAMS) 1–6. (2023)
Zurück zum Zitat P. Tiwari, M. Kaushik, A. Shastri, J.K. Rai, V. Gahlaut, Simulated design and analysis of highly isolated 5G millimeter-waves MIMO antenna with wideband characteristic, in 2023 First International Conference on Microwave, Antenna and Communication (MAC) (pp. 1–6). (2023) P. Tiwari, M. Kaushik, A. Shastri, J.K. Rai, V. Gahlaut, Simulated design and analysis of highly isolated 5G millimeter-waves MIMO antenna with wideband characteristic, in 2023 First International Conference on Microwave, Antenna and Communication (MAC) (pp. 1–6). (2023)
Zurück zum Zitat A.K. Tyagi, Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications, in AI and Blockchain Applications in Industrial Robotics, 171–199 (2024) A.K. Tyagi, Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications, in AI and Blockchain Applications in Industrial Robotics, 171–199 (2024)
Zurück zum Zitat K.K. Vaigandla, M.K. Vanteru, M. Siluveru, An extensive examination of the IoT and blockchain technologies in relation to their applications in the healthcare industry. Mesop.n J. Comput. Sci. 2024, 1–14 (2024) K.K. Vaigandla, M.K. Vanteru, M. Siluveru, An extensive examination of the IoT and blockchain technologies in relation to their applications in the healthcare industry. Mesop.n J. Comput. Sci. 2024, 1–14 (2024)
Zurück zum Zitat T. Xu, J.B. Wendt, M. Potkonjak, Security of IoT systems: Design challenges and opportunities, in 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (pp. 417–423). IEEE (2014) T. Xu, J.B. Wendt, M. Potkonjak, Security of IoT systems: Design challenges and opportunities, in 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (pp. 417–423). IEEE (2014)
Zurück zum Zitat M.A. Zormati, H. Lakhlef, S. Ouni, Review and analysis of recent advances in intelligent network softwarization for the Internet of Things. Comput. Netw. 110215 (2024) M.A. Zormati, H. Lakhlef, S. Ouni, Review and analysis of recent advances in intelligent network softwarization for the Internet of Things. Comput. Netw. 110215 (2024)
Metadaten
Titel
Ensuring IoT Security in 5G Era: Examining Protocols, Architectures, and Security Measures
verfasst von
Poonam Tiwari
Nidhi Sharma
Swati Chudhary
Vishant Gahlaut
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-68038-0_18