Top Research Papers on Network Security
Dive into the top research papers on network security that offer comprehensive insights into safeguarding data and networks from cyber threats. These papers, penned by experts in the field, explore innovative techniques and strategies essential for maintaining secure networks. Whether you are an academic, professional, or enthusiast, these studies will provide valuable knowledge to enhance your understanding and application of network security.
Looking for research-backed answers?Try AI Search
Cryptography and Network Security
605 Citations 2022Marcelo Sampaio de Alencar
River Publishers eBooks
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP prot...
This chapter discusses the chief objectives of securing a network and provides information on information security terminology. The aim of network security is to provide proactive defense methods and mechanisms to protect a network against internal and external threats. The three main objectives in securing a network are to ensure: confidentiality, integrity, and availability. The chapter describes the types of network security and the chief risks related to the logical security of a network. Different kinds of network attacks include reconnaissance attack, password attacks access attacks, net...
5G Network Slicing: A Security Overview
137 Citations 2020Ruxandra F. Olimid, Gianfranco Nencioni
IEEE Access
This article spotlighting the security in 5G network slicing highlights threats and recommendations, which are presented in terms of life-cycle security, intra-slice security, and inter-sliceSecurity, and identifies and discusses open security issues related to network slicing.
Security Enhancement for NOMA-UAV Networks
150 Citations 2020Nan Zhao, Yanxin Li, Shun Zhang + 4 more
IEEE Transactions on Vehicular Technology
This paper proposes two schemes to guarantee the secure transmission in UAV-NOMA networks by derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users.
Physical-Layer Security in 6G Networks
128 Citations 2021Lorenzo Mucchi, Sara Jayousi, Stefano Caputo + 7 more
IEEE Open Journal of the Communications Society
The sixth generation (6G) of mobile network will be composed by different nodes, from macro- devices to nano- devices, providing a full connectivity fabric all around us, and physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.
A Secure Federated Learning Framework for 5G Networks
270 Citations 2020Yi Liu, Jialiang Peng, Jiawen Kang + 3 more
IEEE Wireless Communications
A blockchain-based secure FL framework to create smart contracts and prevent malicious or unreliable participants from being involved in FL is proposed, which can effectively deter poisoning and membership inference attacks, thereby improving the security of FL in 5G networks.
Security and Privacy on 6G Network Edge: A Survey
213 Citations 2023Bomin Mao, Jiajia Liu, Yingying Wu + 1 more
IEEE Communications Surveys & Tutorials
How security and privacy can be destroyed by attacking one of the three technologies and how the three services support each other to realize efficient and achievable security protection is explained.
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such tradi...
Future of generative adversarial networks (GAN) for anomaly detection in network security: A review
126 Citations 2024Willone Lim, Kelvin S. C. Yong, Lau Bee Theng + 1 more
Computers & Security
Anomaly detection is crucial in various applications, particularly cybersecurity and network intrusion. However, a common challenge across anomaly detection techniques is the scarcity of data that accurately represents abnormal behavior, as such behavior is often detrimental to systems and, consequently, rare. This data limitation hampers the development and evaluation of effective anomaly detection methods. In recent years, Generative Adversarial Networks (GANs) have garnered significant attention in anomaly detection research due to their unique capacity to generate new data. This study cond...
Security and Privacy Challenges in 5G-Enabled Vehicular Networks
178 Citations 2020Chengzhe Lai, Rongxing Lu, Dong Zheng + 1 more
IEEE Network
The infrastructure of 5G-enabled vehicular networks is presented, the essential security and privacy aspects of V2X in LTE specified by 3GPP are introduced, and several candidate solutions are proposed, including secure group setup with privacy preservation, distributed group key management, and cooperative message authentication are proposed.
Security and channel noise management in cognitive radio networks
182 Citations 2020Anandakumar Haldorai, Arulmurugan Ramu
Computers & Electrical Engineering
The PKC-based McEliece secondary key provides an error correction capacity, which can remove the noise during secondary user allocation and enhance the effectiveness of the spectrum management, which collaborate effectively over the noise channel management.
A survey on security and authentication in wireless body area networks
101 Citations 2020Bhawna Narwal, Amar Kumar Mohapatra
Journal of Systems Architecture
This survey elaborates the functionality of WBAN, its technologies, building blocks, and a much wider view ofWBAN in terms of security and authentication to serve the bigger goal of providing a bird-eye view of the domain.
A 15-user quantum secure direct communication network
207 Citations 2021Zhantong Qi, Yuanhua Li, Yi‐Wen Huang + 3 more
Light Science & Applications
A 15-user quantum secure direct communication network based on time–energy entanglement and sum-frequency generation is experimentally demonstrated, and any two users can perform QSDC task over 40 kilometers of optical fiber.
Quantum Key Distribution Secured Optical Networks: A Survey
108 Citations 2021Purva Sharma, Anuj Agrawal, Vimal Bhatia + 2 more
IEEE Open Journal of the Communications Society
A comprehensive survey of the state-of-the-art QKD secured optical networks, which is going to shape communication networks in the coming decades, and describes the types of quantum hacking attacks on the QD system along with the methods used to prevent them.
A taxonomy of blockchain-enabled softwarization for secure UAV network
114 Citations 2020Aparna Kumari, Rajesh Gupta, Sudeep Tanwar + 1 more
Computer Communications
A blockchain-enabled UAV softwarization architecture for secure communication and network management that provides dynamic, flexible, and on-the-fly decision capabilities for communication services over the UAV network.
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
112 Citations 2022Tejasvi Alladi, Vinay Chamola, Nishad Sahu + 3 more
IEEE Communications Surveys & Tutorials
This study analyzes around 75 blockchain-based security schemes for vehicular networks from an application, security, and blockchain perspective, and lists out some common challenges and future research directions in this field.
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
101 Citations 2022Ankit Attkan, Virender Ranga
Complex & Intelligent Systems
A comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity, and the integration of newer technologies in IoT key management yields enhanced security features.
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks
103 Citations 2023Elmehdi Illi, Marwa Qaraqe, Saud Althunibat + 7 more
IEEE Communications Surveys & Tutorials
This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things, and reviews essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection.
Beamforming and Jamming Optimization for IRS-Aided Secure NOMA Networks
117 Citations 2021Wei Wang, Xin Liu, Jie Tang + 4 more
IEEE Transactions on Wireless Communications
Numerical results show that the secure transmission in the proposed IRS-NOMA scheme can be effectively guaranteed with the assistance of artificial jamming.
Blockchain-Empowered Secure Spectrum Sharing for 5G Heterogeneous Networks
133 Citations 2020Zhenyu Zhou, Xinyi Chen, Yan Zhang + 1 more
IEEE Network
A privacy-preserved, incentive-compatible, and spectrum-efficient framework based on blockchain is developed, which is implemented in two stages, and the operation details of secure spectrum sharing, incentive mechanism design, and efficient spectrum allocation are elaborate.