Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities.
Shams Forruque AhmedMd. Sakib Bin AlamShaila AfrinSabiha Jannat RafaSamanta Binte TaherMaliha KabirS. M. MuyeenAmir H. GandomiPublished in: IEEE Access (2024)
Keyphrases
- security issues
- security concerns
- security requirements
- security mechanisms
- security problems
- information security
- sensitive data
- security threats
- security measures
- secure multiparty computation
- security properties
- rfid systems
- privacy preserving
- data security
- security management
- security policies
- security services
- electronic payment
- security and privacy issues
- privacy requirements
- identity management
- authentication protocol
- data privacy
- homomorphic encryption
- privacy issues
- rfid technology
- cloud computing
- security protocols
- protection mechanisms
- security model
- cryptographic protocols
- user privacy
- access control
- smart card
- network security
- functional requirements
- security analysis
- privacy concerns
- semi honest
- personal data
- security level
- computing infrastructure
- trusted third party
- preserving privacy
- mobile devices
- electronic transactions
- data protection
- authentication scheme
- data confidentiality
- statistical databases
- privacy preserving data mining
- data encryption
- information leakage
- key management
- ubiquitous computing
- personal information
- data sharing