
Wireless communication systems have encountered security challenges since their inception. In the first-generation (1G) networks, mobile devices and wireless links were susceptible to illegal cloning and identity spoofing. Second-generation (2G) networks experienced a rise in message spamming, which facilitated large-scale attacks and the spread of misinformation and unwanted advertisements. Many of the security flaws in the fifth-generation (5G) networks originate from vulnerabilities inherited from LTE (Long-Term Evolution) systems, such as unauthorized data access, denial of service (DoS) attacks, data breaches, and audio surveillance. To address these issues, a variety of security enhancement methods have been proposed in recent years. This paper reviews several of these strategies, evaluating their effectiveness in mitigating threats based on defined assessment criteria
Security Analysis, 5G, LTS, Software defined networks
Security Analysis, 5G, LTS, Software defined networks
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
