Top Research Papers on Network Security
Dive into the top research papers on network security that offer comprehensive insights into safeguarding data and networks from cyber threats. These papers, penned by experts in the field, explore innovative techniques and strategies essential for maintaining secure networks. Whether you are an academic, professional, or enthusiast, these studies will provide valuable knowledge to enhance your understanding and application of network security.
Looking for research-backed answers?Try AI Search
Cryptography and Network Security
605 Citations 2022Marcelo Sampaio de Alencar
River Publishers eBooks
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP prot...
This chapter discusses the chief objectives of securing a network and provides information on information security terminology. The aim of network security is to provide proactive defense methods and mechanisms to protect a network against internal and external threats. The three main objectives in securing a network are to ensure: confidentiality, integrity, and availability. The chapter describes the types of network security and the chief risks related to the logical security of a network. Different kinds of network attacks include reconnaissance attack, password attacks access attacks, net...
5G Network Slicing: A Security Overview
137 Citations 2020Ruxandra F. Olimid, Gianfranco Nencioni
IEEE Access
This article spotlighting the security in 5G network slicing highlights threats and recommendations, which are presented in terms of life-cycle security, intra-slice security, and inter-sliceSecurity, and identifies and discusses open security issues related to network slicing.
Security Enhancement for NOMA-UAV Networks
150 Citations 2020Nan Zhao, Yanxin Li, Shun Zhang + 4 more
IEEE Transactions on Vehicular Technology
This paper proposes two schemes to guarantee the secure transmission in UAV-NOMA networks by derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users.
Physical-Layer Security in 6G Networks
128 Citations 2021Lorenzo Mucchi, Sara Jayousi, Stefano Caputo + 7 more
IEEE Open Journal of the Communications Society
The sixth generation (6G) of mobile network will be composed by different nodes, from macro- devices to nano- devices, providing a full connectivity fabric all around us, and physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.
A Secure Federated Learning Framework for 5G Networks
270 Citations 2020Yi Liu, Jialiang Peng, Jiawen Kang + 3 more
IEEE Wireless Communications
A blockchain-based secure FL framework to create smart contracts and prevent malicious or unreliable participants from being involved in FL is proposed, which can effectively deter poisoning and membership inference attacks, thereby improving the security of FL in 5G networks.
Security and Privacy on 6G Network Edge: A Survey
213 Citations 2023Bomin Mao, Jiajia Liu, Yingying Wu + 1 more
IEEE Communications Surveys & Tutorials
How security and privacy can be destroyed by attacking one of the three technologies and how the three services support each other to realize efficient and achievable security protection is explained.
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such tradi...
Future of generative adversarial networks (GAN) for anomaly detection in network security: A review
126 Citations 2024Willone Lim, Kelvin S. C. Yong, Lau Bee Theng + 1 more
Computers & Security
Anomaly detection is crucial in various applications, particularly cybersecurity and network intrusion. However, a common challenge across anomaly detection techniques is the scarcity of data that accurately represents abnormal behavior, as such behavior is often detrimental to systems and, consequently, rare. This data limitation hampers the development and evaluation of effective anomaly detection methods. In recent years, Generative Adversarial Networks (GANs) have garnered significant attention in anomaly detection research due to their unique capacity to generate new data. This study cond...
Security and Privacy Challenges in 5G-Enabled Vehicular Networks
178 Citations 2020Chengzhe Lai, Rongxing Lu, Dong Zheng + 1 more
IEEE Network
The infrastructure of 5G-enabled vehicular networks is presented, the essential security and privacy aspects of V2X in LTE specified by 3GPP are introduced, and several candidate solutions are proposed, including secure group setup with privacy preservation, distributed group key management, and cooperative message authentication are proposed.
Security and channel noise management in cognitive radio networks
182 Citations 2020Anandakumar Haldorai, Arulmurugan Ramu
Computers & Electrical Engineering
The PKC-based McEliece secondary key provides an error correction capacity, which can remove the noise during secondary user allocation and enhance the effectiveness of the spectrum management, which collaborate effectively over the noise channel management.
A survey on security and authentication in wireless body area networks
101 Citations 2020Bhawna Narwal, Amar Kumar Mohapatra
Journal of Systems Architecture
This survey elaborates the functionality of WBAN, its technologies, building blocks, and a much wider view ofWBAN in terms of security and authentication to serve the bigger goal of providing a bird-eye view of the domain.
A 15-user quantum secure direct communication network
207 Citations 2021Zhantong Qi, Yuanhua Li, Yi‐Wen Huang + 3 more
Light Science & Applications
A 15-user quantum secure direct communication network based on time–energy entanglement and sum-frequency generation is experimentally demonstrated, and any two users can perform QSDC task over 40 kilometers of optical fiber.
Quantum Key Distribution Secured Optical Networks: A Survey
108 Citations 2021Purva Sharma, Anuj Agrawal, Vimal Bhatia + 2 more
IEEE Open Journal of the Communications Society
A comprehensive survey of the state-of-the-art QKD secured optical networks, which is going to shape communication networks in the coming decades, and describes the types of quantum hacking attacks on the QD system along with the methods used to prevent them.
A taxonomy of blockchain-enabled softwarization for secure UAV network
114 Citations 2020Aparna Kumari, Rajesh Gupta, Sudeep Tanwar + 1 more
Computer Communications
A blockchain-enabled UAV softwarization architecture for secure communication and network management that provides dynamic, flexible, and on-the-fly decision capabilities for communication services over the UAV network.
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
112 Citations 2022Tejasvi Alladi, Vinay Chamola, Nishad Sahu + 3 more
IEEE Communications Surveys & Tutorials
This study analyzes around 75 blockchain-based security schemes for vehicular networks from an application, security, and blockchain perspective, and lists out some common challenges and future research directions in this field.
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
101 Citations 2022Ankit Attkan, Virender Ranga
Complex & Intelligent Systems
A comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity, and the integration of newer technologies in IoT key management yields enhanced security features.
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks
103 Citations 2023Elmehdi Illi, Marwa Qaraqe, Saud Althunibat + 7 more
IEEE Communications Surveys & Tutorials
This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things, and reviews essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection.
Beamforming and Jamming Optimization for IRS-Aided Secure NOMA Networks
117 Citations 2021Wei Wang, Xin Liu, Jie Tang + 4 more
IEEE Transactions on Wireless Communications
Numerical results show that the secure transmission in the proposed IRS-NOMA scheme can be effectively guaranteed with the assistance of artificial jamming.
Blockchain-Empowered Secure Spectrum Sharing for 5G Heterogeneous Networks
133 Citations 2020Zhenyu Zhou, Xinyi Chen, Yan Zhang + 1 more
IEEE Network
A privacy-preserved, incentive-compatible, and spectrum-efficient framework based on blockchain is developed, which is implemented in two stages, and the operation details of secure spectrum sharing, incentive mechanism design, and efficient spectrum allocation are elaborate.
Security and privacy in 6G networks: New areas and new challenges
335 Citations 2020Minghao Wang, Tianqing Zhu, Tao Zhang + 3 more
Digital Communications and Networks
This survey discusses four key aspects of 6G networks – real-time intelligent edge computing, distributed artificial intelligence, intelligent radio, and 3D intercoms – and some promising emerging technologies in each area, along with the relevant security and privacy issues.
A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks
150 Citations 2022Uppalapati Srilakshmi, Saleh Alghamdi, Veera Ankalu Vuyyuru + 2 more
IEEE Access
The Bacteria for Aging Optimization Algorithm (BFOA), which finds the ideal hops in advancing the routing, is utilized to offer a trust-based protected and energy-efficient navigation in MANETs using a trust the most vulnerable point in the network, open to attacks including eavesdropping, routing, and application changes.
Security of Zero Trust Networks in Cloud Computing: A Comparative Review
100 Citations 2022Sirshak Sarkar, Gaurav Choudhary, Shishir Kumar Shandilya + 2 more
Sustainability
This survey compares the novel requirement-specific features used by state-of-the-art research models for zero-trust cloud networks, focusing on domain-specific issues plaguing modern cloud computing networks, which leverage choosing and implementing features necessary for future networks and incorporate intelligent security orchestration, automation and response.
Secure Beamforming for Cognitive Satellite Terrestrial Networks With Unknown Eavesdroppers
104 Citations 2020Zhi Lin, Min Lin, Benoı̂t Champagne + 2 more
IEEE Systems Journal
This article proposes a beamforming (BF) scheme for a cognitive satellite terrestrial network, where the base station and a cooperative terminal are exploited as green interference resources to enhance the system security performance in the presence of unknown eavesdroppers.
Online social networks security and privacy: comprehensive review and analysis
234 Citations 2021Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems
A thorough review of different security and privacy threats and existing solutions that can provide security to social network users and discusses open issues, challenges, and relevant security guidelines to achieve trustworthiness in online social networks.
Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
181 Citations 2020Abhishek Verma, Virender Ranga
IEEE Sensors Journal
A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding and a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is carried out.
Secure Data Storage and Recovery in Industrial Blockchain Network Environments
268 Citations 2020Wei Liang, Yongkai Fan, Kuan‐Ching Li + 2 more
IEEE Transactions on Industrial Informatics
Experimental results show that the proposed scheme improves the repair rate of multinode data by 9% and data storage rate increased by 8.6%, indicating to be promising with good security and real-time performance.
Joint Precoding Optimization for Secure SWIPT in UAV-Aided NOMA Networks
202 Citations 2020Wei Wang, Jie Tang, Nan Zhao + 4 more
IEEE Transactions on Communications
A UAV-aided NOMA scheme is proposed to achieve simultaneous wireless information and power transfer (SWIPT) and guarantee the secure transmission for ground passive receivers (PRs), in which the nonlinear energy harvesting model is applied.
Artificial Noise Aided Secure NOMA Communications in STAR-RIS Networks
103 Citations 2022Yi Han, Na Li, Yuanwei Liu + 2 more
IEEE Wireless Communications Letters
An alternating optimization (AO) based iterative algorithm leveraging the classical successive convex approximation (SCA) and the semidefinite relaxation (SDR) techniques is proposed to derive the optimal AN model and the RIS parameters and it is found that the proposed algorithm provides better secrecy performance with less AN power compared with the benchmark schemes.
Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks
170 Citations 2020Sisai Fang, Gaojie Chen, Yonghui Li
IEEE Wireless Communications Letters
This letter proposes a novel secure intelligent reflecting surface (IRS)-assisted unmanned aerial vehicle (UAV) system, where the UAV sends confidential messages to a legitimate receiver, in the presence of a passive eavesdropper, using an iterative algorithm based on successive convex approximation (SCA).
Providing secure and reliable communication for next generation networks in smart cities
114 Citations 2020Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily + 2 more
Sustainable Cities and Society
Results show that the proposed solution outperforms other semi- cooperative and non-cooperative service composition techniques in terms of efficient service delivery and composition delay, service hit ratio, and suspicious node identification.
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
198 Citations 2022Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors
The possibility of benefiting from machine learning algorithms by reducing the security costs of wireless sensor networks in several domains is discussed, in addition to the challenges and proposed solutions to improving the ability of sensors to identify threats, attacks, risks, and malicious nodes through their ability to learn and self-development using machineLearning algorithms.
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
418 Citations 2021Hongzhi Guo, Jingyi Li, Jiajia Liu + 2 more
IEEE Communications Surveys & Tutorials
This paper is the first to present the state-of-the-art of security for SAGSIN, since existing surveys focused either on a certain segment or on several segments of the integrated network, and little can be found on the full coverage network.
Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network
324 Citations 2021Saurabh Singh, A. S. M. Sanwar Hosen, Byungun Yoon
IEEE Access
The blockchain concept and relevant factors that provide a detailed analysis of potential security attacks are discussed and existing solutions that can be deployed as countermeasures to such attacks are presented.
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?
123 Citations 2020Chafika Benzaïd, Tarik Taleb
IEEE Network
Light is shed on how Ai may impact the security of 5G and its successor from its posture of defender, offender or victim, and potential defenses to safeguard from malevolent Ai are recommended while pointing out their limitations and adoption challenges.
Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing Networks
126 Citations 2022Sun Mao, Lei Liu, Ning Zhang + 4 more
IEEE Transactions on Vehicular Technology
An iterative algorithm is developed, in which the Dinkelbach-type method and block coordinate descent technique are utilized to tackle the fractional objective function and coupled optimization variables, respectively, and the closed-form expression for local computing frequencies optimization subproblem is derived.
Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper
158 Citations 2022Weidang Lu, Yu Ding, Yuan Gao + 4 more
IEEE Transactions on Communications
This paper proposes a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper and results show that the proposed scheme is superior to the benchmarks in terms of the system security computation performance.
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
191 Citations 2020Felix O. Olowononi, Danda B Rawat, Chunmei Liu
IEEE Communications Surveys & Tutorials
The interactions between resilient CPS using ML and resilient ML when applied in CPS are surveyed to have a thorough understanding of recent advances on ML-based security and securing ML for CPS and countermeasures, as well as research trends in this active research area.
Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks
119 Citations 2021Jiayi Zhang, Hongyang Du, Qiang Sun + 2 more
IEEE Transactions on Information Forensics and Security
Compared with traditional MIMO systems, the RIS-aided system offers better performance in terms of physical layer security, and adopting RIS equipped with a small number of reflecting elements cannot improve the system performance when the path loss of NLoS is small.
A Machine Learning Approach for Blockchain-Based Smart Home Networks Security
144 Citations 2020Muhammad Adnan Khan, Sagheer Abbas, Abdur Rehman + 5 more
IEEE Network
This paper introduces a resource-efficient, blockchain-based solution for secure and private IoT, made possible through novel exploitation of computational resources in a typical IoT environment, along with the use of Deep Extreme Learning Machine (DELM).