{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T20:28:05Z","timestamp":1770150485925,"version":"3.49.0"},"reference-count":89,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9813965","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"page":"446-454","source":"Crossref","is-referenced-by-count":32,"title":["Cyber Security Threats for 5G Networks"],"prefix":"10.1109","author":[{"given":"Jaya Preethi","family":"Mohan","sequence":"first","affiliation":[{"name":"University of North Dakota,School of Electrical Engineering and Computer Science (SEECS)"}]},{"given":"Niroop","family":"Sugunaraj","sequence":"additional","affiliation":[{"name":"University of North Dakota,School of Electrical Engineering and Computer Science (SEECS)"}]},{"given":"Prakash","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"University of North Dakota,School of Electrical Engineering and Computer Science (SEECS)"}]}],"member":"263","reference":[{"key":"ref73","first-page":"12","article-title":"Securing Future 5G-Networks","volume":"21","author":"kamasa","year":"2020","journal-title":"The Resource Collection"},{"key":"ref72","first-page":"1","year":"2020","journal-title":"CISA 5G strategy Ensuring the security and resilience of 5G infrastructure in our nation 2020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322070"},{"key":"ref76","article-title":"5G Cellular Technologies for Supporting Future Power Grid Communication Networks","author":"ali","year":"2016","journal-title":"IEEE Smart Grid"},{"key":"ref77","first-page":"77","article-title":"In Defense of 5G: National Security and Patent Rights Under the Public Interest Factors","volume":"86","author":"mok","year":"2019","journal-title":"The University of Chicago Law Review"},{"key":"ref74","article-title":"Computer Security Resource Centre","year":"2022","journal-title":"GLOSSARY"},{"key":"ref39","article-title":"Security in 5G-Enabled Internet of Things Communication: Issues, Challenges and Future Research Roadmap","author":"wazid","year":"2020","journal-title":"IEEE Access"},{"key":"ref75","article-title":"5G and Aviation Safety","year":"2022","journal-title":"5G"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102660"},{"key":"ref78","article-title":"5G Introduces New Benefits, Cybersecurity Risks","year":"2020","journal-title":"Directory of Science and Technology"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC46935.2019.9078011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8856683"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679326"},{"key":"ref31","year":"2019","journal-title":"An Introduction to Jammers"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031175"},{"key":"ref37","first-page":"1","author":"holtrup","year":"2021","journal-title":"5G System Security Analysis"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3269961.3269968"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91149-2_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref60","year":"0","journal-title":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2019.8907026"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00855-0"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2993769"},{"key":"ref28","year":"2021","journal-title":"A Slice in Time"},{"key":"ref64","author":"yu","year":"2006","journal-title":"SybilGuard Defending against sybil attacks via social networks"},{"key":"ref27","year":"2021","journal-title":"Cybersecurity 2020 - 2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900524"},{"key":"ref66","article-title":"A survey: Security and privacy in 5G vehicular networks","author":"sa?lam","year":"2019","journal-title":"Ieeexplore Ieee Org"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00855-0"},{"key":"ref68","article-title":"An overview of sustainable green 5G networks","author":"wu","year":"2016","journal-title":"Ieeexplore Ieee Org"},{"key":"ref69","year":"2019","journal-title":"5G power whitebook"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/telecom1010005"},{"key":"ref1","volume":"12","author":"fourati","year":"2021","journal-title":"A survey of 5G network systems challenges and machine learning approaches"},{"key":"ref20","first-page":"2","article-title":"Study of 5G Services Standardization: Specifications and Requirements","volume":"2018 novem","author":"ateya","year":"2019","journal-title":"International Congress on Ultra Modern Telecommunications and Control Systems and Workshops"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2837382"},{"key":"ref21","article-title":"What is mMTC in 5G NR, and how does it impact NB-IoT and LTE-M","author":"blackman","year":"2019","journal-title":"Fundamentals"},{"key":"ref24","first-page":"1","year":"2019","journal-title":"Overview of Risks Introduced By 5G Adoption in the United States"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2018.8491078"},{"key":"ref26","article-title":"Computer Security Resource Centre","year":"2022","journal-title":"GLOSSARY"},{"key":"ref25","first-page":"3800","author":"swamy","year":"2020","journal-title":"Study of Security for 5G Wireless Communication Network"},{"key":"ref50","article-title":"Fast cross layer authentication scheme for dynamic wireless network","author":"zhang","year":"2022","journal-title":"X T -2020 I Wireless and undefined 2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067807"},{"key":"ref59","article-title":"Detecting sybil attacks using proofs of work and location in vanets","author":"baza","year":"2020","journal-title":"Ieeexplore Ieee Org"},{"key":"ref58","first-page":"447","author":"hasneen","year":"2022","journal-title":"A Survey on 5G Architecture and Security Scopes in SDN and NFV"},{"key":"ref57","author":"khan","year":"2017","journal-title":"Security issues in 5G device to device communication"},{"key":"ref56","year":"2018","journal-title":"2018 IEEE Global Communications Conference (GLOBECOM) proceedings"},{"key":"ref55","first-page":"12","article-title":"Securing Future 5G-Networks","volume":"21","author":"kamasa","year":"2020","journal-title":"The Resource Collection"},{"key":"ref54","author":"geller","year":"2018","journal-title":"Whitepaper Cisco Public 5G Security Innovation with Cisco"},{"key":"ref53","year":"2017","journal-title":"2017 IEEE Conference on Standards for Communications and Networking (CSCN)"},{"key":"ref52","article-title":"Attack modeling and intrusion detection system for 5G wireless communication network","volume":"30","author":"gupta","year":"2016","journal-title":"Wiley Online Library"},{"key":"ref10","article-title":"5G New Radio for Public Safety Mission Critical Communications","author":"li","year":"2021","journal-title":"ArXiv org"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2753080"},{"key":"ref40","article-title":"Secure D2D communication for 5G IoT network based on lightweight cryptography","volume":"10","author":"seok","year":"2020","journal-title":"Applied Sciences (Switzerland)"},{"key":"ref12","author":"goud","year":"2022","journal-title":"Cybersecurity Insiders"},{"key":"ref13","article-title":"Vodafone Portugal hit with cyberattack affecting 4G\/5G network, TV, SMS services","author":"greig","year":"2022","journal-title":"ZDNet"},{"key":"ref14","article-title":"Hackers are targeting telecom companies to steal 5G secrets","author":"palmer","year":"2021","journal-title":"ZDNet"},{"key":"ref15","first-page":"1","article-title":"5G core network security issues and attack classification from network protocol perspective","volume":"10","author":"kim","year":"2020","journal-title":"Journal of Internet Services and Information Security"},{"key":"ref82","first-page":"1","article-title":"Cybersecurity in 5G","author":"rosenblatt","year":"2021","journal-title":"Yale Cyber Leadership Forum"},{"key":"ref16","article-title":"Microsoft catches Russian state hackers using IoT devices to breach networks","author":"goodin","year":"2019","journal-title":"Arstechnica"},{"key":"ref81","year":"2020","journal-title":"Threat vector GTP Vulnerabilities in LTE and 5G Networks"},{"key":"ref17","first-page":"1","volume":"16","author":"jain","year":"2021","journal-title":"Implementing Security in I O T Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System A Simulation Study"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref18","author":"zerrusen","year":"2019","journal-title":"The National Security Challenges of Fifth Generation (5G) Wireless Communcations Winning the Race to 5G Securely"},{"key":"ref83","first-page":"1165","article-title":"Towards 5G security","volume":"1","author":"horn","year":"2015","journal-title":"Proceedings - 14th IEEE International Conference on Trust Security and Privacy in Computing and Communications TrustCom 2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145377"},{"key":"ref80","first-page":"1","year":"2021","journal-title":"Potential threat vectors to 5G infrastructure"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491207"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/MCOM.2014.6736761","article-title":"Massive MIMO for next generation wireless systems","volume":"52","author":"larsson","year":"2014","journal-title":"IEEE Communications Magazine"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/fi10010003","article-title":"Review of latest advances in 3GPP standardization: D2D communication in 5G systems and its energy consumption models","volume":"10","author":"h\u00f6yhty\u00e4","year":"2018","journal-title":"Future Internet"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00156"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316417744"},{"key":"ref86","first-page":"1","year":"2020","journal-title":"Embedded SIM Remote Provisioning Architecture"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491923"},{"key":"ref49","article-title":"Short survey on physical layer authentication by machine-learning for 5G-based Internet of Things","year":"2022","journal-title":"Ieeexplore Ieee Org"},{"key":"ref87","article-title":"IoT Security Guidelines Overview","volume":"2 2","year":"2020","journal-title":"Iot security guidelines"},{"key":"ref88","article-title":"What&#x2019;s a Sybil Attack & How Do Blockchains Mitigate Them?","author":"garner","year":"2018","journal-title":"Coin Central"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059397"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2745110"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2753080"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/s20030828"},{"key":"ref47","author":"awais javed","year":"2019","journal-title":"5G Security Artifacts (DoS \/ DDoS and Authentication) 5G Security Artifacts (DoS \/ DDoS and Authentication)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357499"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000093"},{"key":"ref44","author":"ying","year":"2019","journal-title":"Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2021921027"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","location":"Mankato, MN, USA","start":{"date-parts":[[2022,5,19]]},"end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09813965.pdf?arnumber=9813965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:45:02Z","timestamp":1659660302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":89,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9813965","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}