{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:51:56Z","timestamp":1775044316743,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031956515","type":"print"},{"value":"9783031956522","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95652-2_15","type":"book-chapter","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:06:00Z","timestamp":1750935960000},"page":"159-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Addressing Cybersecurity Challenges in 5G-Enabled IoT Networks: Solutions and Future Directions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7335-5135","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Azevedo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel J. C. S.","family":"Reis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,27]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"000131","DOI":"10.1109\/INES59282.2023.10297774","volume-title":"2023 IEEE 27th International Conference on Intelligent Engineering Systems (INES)","author":"H Altaleb","year":"2023","unstructured":"Altaleb, H., Zolt\u00e1n, R.: Addressing cybersecurity challenges in 5G-enabled IoT and critical infrastructures: a comprehensive overview. In: 2023 IEEE 27th International Conference on Intelligent Engineering Systems (INES), pp. 000131\u2013000136. IEEE, Nairobi (Jul. 2023). https:\/\/doi.org\/10.1109\/INES59282.2023.10297774"},{"key":"15_CR2","unstructured":"Fortinet: What Are the Security Challenges of 5G and IoT? (2024). Accessed: Oct. 30, 2024. [Online]. Available: https:\/\/www.fortinet.com\/blog\/industry-trends\/the-security-implications-for-5g-and-iot"},{"issue":"21","key":"15_CR3","doi-asserted-by":"publisher","first-page":"8744","DOI":"10.3390\/s23218744","volume":"23","author":"S Li","year":"2023","unstructured":"Li, S., et al.: Post-quantum security: opportunities and challenges. Sensors. 23(21), 8744 (2023). https:\/\/doi.org\/10.3390\/s23218744","journal-title":"Sensors"},{"issue":"6","key":"15_CR4","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/MNET.011.2000088","volume":"34","author":"C Benzaid","year":"2020","unstructured":"Benzaid, C., Taleb, T.: AI for beyond 5G networks: a cyber-security defense or offense enabler? IEEE Netw. 34(6), 140\u2013147 (2020). https:\/\/doi.org\/10.1109\/MNET.011.2000088","journal-title":"IEEE Netw."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ic-ETITE58242.2024.10493287","volume-title":"2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), Vellore, India","author":"K Patel","year":"2024","unstructured":"Patel, K., Vadher, A., Patel, M., Thaker, J., Bhise, A.: AI-based security system for 5G enabled IoT. In: 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), Vellore, India, pp. 1\u20137. IEEE (Feb. 2024). https:\/\/doi.org\/10.1109\/ic-ETITE58242.2024.10493287"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/ICTC55196.2022.9952490","volume-title":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","author":"J Lee","year":"2022","unstructured":"Lee, J., Kim, H., Park, C., Kim, Y., Park, J.-G.: AI-based network security enhancement for 5G industrial internet of things environments. In: 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), pp. 971\u2013975. IEEE, Jeju Island (2022). https:\/\/doi.org\/10.1109\/ICTC55196.2022.9952490"},{"key":"15_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102752","volume":"126","author":"T Le","year":"2022","unstructured":"Le, T., Shetty, S.: Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks. Ad Hoc Netw. 126, 102752 (2022). https:\/\/doi.org\/10.1016\/j.adhoc.2021.102752","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/MNET.011.1900598","volume":"35","author":"Y Lu","year":"2021","unstructured":"Lu, Y., Huang, X., Zhang, K., Maharjan, S., Zhang, Y.: Blockchain and federated learning for 5G beyond. IEEE Netw. 35(1), 219\u2013225 (2021). https:\/\/doi.org\/10.1109\/MNET.011.1900598","journal-title":"IEEE Netw."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comcom.2021.07.009","volume":"178","author":"A Miglani","year":"2021","unstructured":"Miglani, A., Kumar, N.: Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: a systematic review. Comput. Commun. 178, 37\u201363 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.07.009","journal-title":"Comput. Commun."},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Li, X., Wang, C., Zou, X., Wang, S.: A secure and effective authentication method in 5G. In: 2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), vol. 2023, pp. 243\u2013246. IEEE, Nanjing. https:\/\/doi.org\/10.1109\/AINIT59027.2023.10212595","DOI":"10.1109\/AINIT59027.2023.10212595"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/SCC53769.2021.9768338","volume-title":"2021 IEEE 2nd International Conference on Signal, Control and Communication (SCC)","author":"VO Nyangaresi","year":"2021","unstructured":"Nyangaresi, V.O., Abduljabbar, Z.A., Abduljabbar, Z.A.: Authentication and key agreement protocol for secure traffic signaling in 5G networks. In: 2021 IEEE 2nd International Conference on Signal, Control and Communication (SCC), pp. 188\u2013193. IEEE, Tunis (Dec. 2021). https:\/\/doi.org\/10.1109\/SCC53769.2021.9768338"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/ICIEM54221.2022.9853118","volume-title":"2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)","author":"P William","year":"2022","unstructured":"William, P., et al.: Blockchain technology for data privacy using contract mechanism for 5G networks. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp. 461\u2013465. IEEE, London (2022). https:\/\/doi.org\/10.1109\/ICIEM54221.2022.9853118"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/CSNT60213.2024.10546047","volume-title":"2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT)","author":"SEVS Pillai","year":"2024","unstructured":"Pillai, S.E.V.S., Vaddadi, S.A.: Secure communication protocols for enhancing privacy in 5G Mobile networks. In: 2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT), pp. 347\u2013353. IEEE, Jabalpur (2024). https:\/\/doi.org\/10.1109\/CSNT60213.2024.10546047"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1422","DOI":"10.1109\/ICDT61202.2024.10489295","volume-title":"2024 2nd International Conference on Disruptive Technologies (ICDT)","author":"S Ji","year":"2024","unstructured":"Ji, S., Kumar Mishra, A.: 5G security issues challenges and solutions against DDoS attacks: a survey. In: 2024 2nd International Conference on Disruptive Technologies (ICDT), pp. 1422\u20131427. IEEE, Greater Noida (2024). https:\/\/doi.org\/10.1109\/ICDT61202.2024.10489295"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1109\/ICACITE57410.2023.10183203","volume-title":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","author":"KK Sharma","year":"2023","unstructured":"Sharma, K.K., Salaria, A.: A Review on Challenges, Opportunities, and Solutions for 5th Generation Based IoT Using Blockchain & AI. In: 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 1957\u20131962. IEEE, Greater Noida (2023). https:\/\/doi.org\/10.1109\/ICACITE57410.2023.10183203"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ComNet47917.2020.9306082","volume-title":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","author":"TM Hewa","year":"2020","unstructured":"Hewa, T.M., Kalla, A., Nag, A., Ylianttila, M.E., Liyanage, M.: Blockchain for 5G and IoT: opportunities and challenges. In: 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), pp. 1\u20138. IEEE, Hammamet (2020). https:\/\/doi.org\/10.1109\/ComNet47917.2020.9306082"},{"issue":"6","key":"15_CR17","doi-asserted-by":"publisher","first-page":"9794","DOI":"10.1109\/JIOT.2019.2931724","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao, J., Yu, P., Xiang, X., Ma, M., Li, H.: Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J. 6(6), 9794\u20139805 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2931724","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","volume":"17","author":"AAA El-Latif","year":"2020","unstructured":"El-Latif, A.A.A., Abd-El-Atty, B., Mazurczyk, W., Fung, C., Venegas-Andraca, S.E.: Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Trans. Netw. Serv. Manag. 17(1), 118\u2013131 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.2969863","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TNSM.2020.2966951","volume":"17","author":"I Hafeez","year":"2020","unstructured":"Hafeez, I., Antikainen, M., Ding, A.Y., Tarkoma, S.: IoT-KEEPER: detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Trans. Netw. Serv. Manag. 17(1), 45\u201359 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.2966951","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/EuroSPW55150.2022.00008","volume-title":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"P Kumar Sharma","year":"2022","unstructured":"Kumar Sharma, P., Gope, P., Puthal, D.: Blockchain and federated learning-enabled distributed secure and privacy-preserving computing architecture for IoT network. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 1\u20139. IEEE, Genoa (2022). https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00008"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCCNT56998.2023.10306828","volume-title":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","author":"P Rawat","year":"2023","unstructured":"Rawat, P., Kumar, P.: Blockchain based federated deep learning framework for malware attacks detection in IoT devices. In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u201310. IEEE, Delhi (2023). https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306828"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/BigDataSE50710.2020.00020","volume-title":"2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)","author":"Y Fan","year":"2020","unstructured":"Fan, Y., Li, Y., Zhan, M., Cui, H., Zhang, Y.: IoTDefender: a federated transfer learning intrusion detection framework for 5G IoT. In: 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE), pp. 88\u201395. IEEE, Guangzhou (Dec. 2020). https:\/\/doi.org\/10.1109\/BigDataSE50710.2020.00020"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/ICAIIC60209.2024.10463516","volume-title":"In 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","author":"SS Sefati","year":"2024","unstructured":"Sefati, S.S., Fartu, O., Nor, A.M., Halunga, S.: Enhancing internet of things security and efficiency: anomaly detection via proof of stake Blockchain techniques. In: In 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 591\u2013595. IEEE, Osaka (2024). https:\/\/doi.org\/10.1109\/ICAIIC60209.2024.10463516"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Nyangaresi, V.O., Abduljabbar, Z.A., Al Sibahee, M.A., Abduljaleel, I.Q., Abood, E.W.: Towards security and privacy preservation in 5G networks. In: 2021 29th telecommunications forum (TELFOR), vol. 2021, pp. 1\u20134. IEEE, Belgrade. https:\/\/doi.org\/10.1109\/TELFOR52709.2021.9653385","DOI":"10.1109\/TELFOR52709.2021.9653385"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"4466","DOI":"10.1109\/ACCESS.2020.3047895","volume":"9","author":"M Wazid","year":"2021","unstructured":"Wazid, M., Das, A.K., Shetty, S., Gope, P., Rodrigues, J.J.P.C.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access. 9, 4466\u20134489 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3047895","journal-title":"IEEE Access"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICNP59255.2023.10355595","volume-title":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","author":"P Benlloch-Caballero","year":"2023","unstructured":"Benlloch-Caballero, P., Sanchez-Navarro, I., Matencio-Escolar, A., Calero, J.M.A., Wang, Q.: Topology-aware cognitive self-protection framework for automated detection and mitigation of security and privacy incidents in 5G-IoT networks. In: 2023 IEEE 31st International Conference on Network Protocols (ICNP), pp. 1\u20136. IEEE, Reykjavik (2023). https:\/\/doi.org\/10.1109\/ICNP59255.2023.10355595"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Fourth International Conference on Innovations in Computing Research (ICR\u201925)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95652-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T22:06:57Z","timestamp":1751407617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95652-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031956515","9783031956522"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95652-2_15","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"27 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICR 25","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Innovations in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icr12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/icr25\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}