{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:24:16Z","timestamp":1772195056396,"version":"3.50.1"},"reference-count":66,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:00:00Z","timestamp":1772150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>While 5G addresses extreme performance tiers, 3GPP Releases 17 and 18 RedCap fill critical mid-tier performance gaps for diverse applications like industrial sensors and consumer wearables. The existing academic literature remains fragmented, focusing on isolated metrics rather than a holistic synthesis. There is a significant need to integrate technical specifications with empirical industry data. This survey systematically reviews Release 17\/18 specifications, integrating literature from 2021 to 2025. We consolidate academic simulations and industry empirical reports to facilitate a rigorous comparative analysis across critical performance indicators. Findings evaluate complexity reduction via bandwidth limitation, antenna reduction, and HD-FDD. We provide a comprehensive security threat matrix, mapping vulnerabilities like RACH spoofing and paging suppression to countermeasures. RedCap cannot match eMBB throughput or NB-IoT\u2019s battery life. Consequently, legacy LPWA remains more suitable for simple, decade-long sensing tasks. This work contributes a novel use-case taxonomy and a security analysis. This study provides practitioners with actionable insights into complexity trade-offs and network security risks. Future research should prioritize AI-driven management and \u201czero-maintenance\u201d IoT through advanced power-saving innovations.<\/jats:p>","DOI":"10.3390\/fi18030118","type":"journal-article","created":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T10:41:02Z","timestamp":1772188862000},"page":"118","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Survey on 5G RedCap: Technologies, Security Vulnerabilities, and Attack Vectors"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1648-3645","authenticated-orcid":false,"given":"Pavan Raja","family":"I","sequence":"first","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri 690525, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2038-1114","authenticated-orcid":false,"given":"Kurunandan","family":"Jain","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri 690525, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2715-1015","authenticated-orcid":false,"given":"Hari N.","family":"N","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri 690525, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3936-357X","authenticated-orcid":false,"given":"Sethu Subramanian","family":"N","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri 690525, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6702-112X","authenticated-orcid":false,"given":"Prabhakar","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri 690525, India"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Gohil, A., Modi, H., and Patel, S.K. (2013, January 1\u20132). 5G Technology of Mobile Communication: A Survey. Proceedings of the 2013 International Conference on Intelligent Systems and Signal Processing (ISSP), Anand, India.","DOI":"10.1109\/ISSP.2013.6526920"},{"key":"ref_2","unstructured":"Verma, J.K., and Shrivastava, U. (2021, January 1\u20133). A Study on 5G Technology and Its Applications in Telecommunications. Proceedings of the 2021 International Conference on Computational Performance Evaluation (ComPE), Shillong, India."},{"key":"ref_3","unstructured":"GSMA 5G IoT Community (2025). RedCap\/eRedCap for IoT, GSMA. White Paper."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3098","DOI":"10.1109\/COMST.2018.2841349","article-title":"A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions","volume":"20","author":"Parvez","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","unstructured":"Service Requirements for Cyber-Physical Control Applications in Vertical Domains. Standard No. 3GPP. TS 22.104. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/22_series\/22.104\/."},{"key":"ref_6","unstructured":"Study on Communication Services for Critical Medical Applications. Standard No. 3GPP. TR 22.832. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/22_series\/22.832\/."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Jamil, H.M.M., Islam, M., Das, R.K., Pranto, S.A., and Amin, L.A. (2024, January 20\u201328). Enabling Human-Machine Interfaces with 5G RedCap: Architecture, Key Requirements, and Challenges. Proceedings of the 2024 IEEE Conference on Engineering Informatics (ICEI), Hubli, India.","DOI":"10.1109\/ICEI64305.2024.10912368"},{"key":"ref_8","unstructured":"Justification for NR-Light. Standard No. 3GPP. RP-202933. Available online: https:\/\/www.3gpp.org\/ftp\/tsg_ran\/TSG_RAN\/TSGR_90e\/Info_for_workplan\/new_approved_WID_19\/RAN1_3."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Feng, Q., Wang, H., and Chen, H. (2025, January 24\u201325). 5G Redcap Device and Its Low-Cost High Efficiency Ate Test Solution. Proceedings of the 2025 Conference of Science and Technology of Integrated Circuits (CSTIC), Shanghai, China.","DOI":"10.1109\/CSTIC64481.2025.11017961"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, M., Zhang, N., Li, X., and Chen, P. (2024, January 1\u20133). Research on RedCap UE\u2019s performance indicators in real network to support iot applications. Proceedings of the 2024 the 9th International Conference on Cloud Computing and Internet of Things (CCIOT), Hanoi, Vietnam.","DOI":"10.1145\/3704304.3704305"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Song, P., Xiong, S., and Wang, Q. (2024, January 19\u201321). RedCap Performance Analysis and Deployment Strategy Research. Proceedings of the 2024 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Toronto, ON, Canada.","DOI":"10.1109\/BMSB62888.2024.10608332"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"J\u00f6rke, P., Schippers, H., and Wietfeld, C. (2025, January 10\u201313). Empirical Comparison of Power Consumption and Data Rates for 5G New Radio and RedCap Devices. Proceedings of the 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC54725.2025.10976177"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"13125","DOI":"10.1109\/ACCESS.2024.3352508","article-title":"Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities","volume":"12","author":"Ahmed","year":"2024","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Dias, J., Pinto, P., Santos, R., and Malta, S. (2025). 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors, 25.","DOI":"10.3390\/s25133940"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Scalise, P., Boeding, M., Hempel, M., Sharif, H., Delloiacovo, J., and Reed, J. (2024). A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. Future Internet, 16.","DOI":"10.3390\/fi16030067"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Harvanek, M., Bolcek, J., Kufa, J., Polak, L., Simka, M., and Marsalek, R. (2024). Survey on 5G Physical Layer Security Threats and Countermeasures. Sensors, 24.","DOI":"10.3390\/s24175523"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sebestyen, H., Popescu, D.E., and Zmaranda, R.D. (2025). A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. Computers, 14.","DOI":"10.3390\/computers14020061"},{"key":"ref_18","unstructured":"Study on Ambient IoT (Internet of Things) in RAN (Standard No. 3GPP. TR 38.848). Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.848\/."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Tr\u00eenc, E.C., Ni\u0163\u01ce, V., Mihai, R., and Sult\u01cenoiu, C.P. (2025, January 17\u201318). Comparative Analysis of Iot Communication Standards: Lorawan, NB-Iot\/LTE-M, NTN NB-Iot, and 5G Redcap. Proceedings of the 2025 International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, Romania.","DOI":"10.1109\/ISSCS66034.2025.11105603"},{"key":"ref_20","unstructured":"Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Standard No. 3GPP. TS 36.300. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/36_series\/36.300\/."},{"key":"ref_21","unstructured":"(2025). RedCap\/eRedCap: The IoT Technology for 5G Networks; White Paper RedCap-E-R-1-(2.00), Anritsu."},{"key":"ref_22","unstructured":"(2024). 5G RedCap White Paper: Is 5G RedCap the Right Fit for Your IoT Connectivity Needs?, Quectel. White Paper."},{"key":"ref_23","unstructured":"Hill, K. (2023). 5G-Enabled IoT: Will RedCap Help Deliver on the Promise of Digital Transformation?, RCR Wireless News. Editorial Report."},{"key":"ref_24","unstructured":"Physical Layer Procedures for Data (Release 17). Standard No. 3GPP. TS 38.214: NR. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.214\/."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Li, X., Xu, X., and Hu, C. (2023, January 17\u201319). Research on 5G RedCap Standard and Key Technologies. Proceedings of the 2023 4th Information Communication Technologies Conference (ICTC), Nanjing, China.","DOI":"10.1109\/ICTC57116.2023.10154644"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Guo, J., Li, N., Zhu, J., She, X., and Chen, P. (2022, January 9\u201312). Study on Key Characteristics and Standardization Evolution for NR RedCap UE. Proceedings of the 2022 IEEE the 8th International Conference on Computer and Communications (ICCC), Chengdu, China.","DOI":"10.1109\/ICCC56324.2022.10065715"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sudhamani, C., Roslee, M., Tiang, J.J., and Rehman, A.U. (2023). A Survey on 5G Coverage Improvement Techniques: Issues and Future Challenges. Sensors, 23.","DOI":"10.3390\/s23042356"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Srivastava, M., and Ray, V.K. (2024, January 13\u201314). A Survey on User Equipment Power Saving for 5G Communication Systems. Proceedings of the 2024 1st International Conference on Sustainability and Technological Advancements in Engineering Domain (SUSTAINED), Faridabad, India.","DOI":"10.1109\/SUSTAINED63638.2024.11074181"},{"key":"ref_29","unstructured":"Radio Resource Control (RRC) Protocol Specification (Release 17). Standard No. 3GPP. TS 38.331: NR. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.331\/."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Tayyab, M., Kolehmainen, N., Butt, M.M., Khlass, A., and Ratasuk, R. (2022, January 4\u20138). Energy Efficient RRM Relaxation for Reduced Capability UEs in 5G Networks. Proceedings of the 2022 IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10000873"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Tayyab, M., Sofonias, H., Jarvela, R., Kolehmanen, N., and Gursu, H.M. (2021, January 6\u20139). RRM Relaxation in Connected State for Reduced Capability (RedCap) NR UEs. Proceedings of the 2021 17th International Symposium on Wireless Communication Systems (ISWCS), Berlin, Germany.","DOI":"10.1109\/ISWCS49558.2021.9562143"},{"key":"ref_32","unstructured":"Study on further NR RedCap UE Complexity Reduction (Release 18). Standard No. 3GPP. RP-213661. Available online: https:\/\/www.3gpp.org\/ftp\/tsg_ran\/TSG_RAN\/TSGR_94e\/Info_for_workplan\/new_approved_SID_9\/RAN1_7."},{"key":"ref_33","unstructured":"Feasibility Study on Integrated Sensing and Communication (Release 19). Standard No. 3GPP.TR 22.837. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/22_series\/22.837\/."},{"key":"ref_34","unstructured":"System Architecture for the 5G System (5GS); Stage 2. Standard No. 3GPP. TS 23.501. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/23_series\/23.501\/."},{"key":"ref_35","unstructured":"Oracle (2024). Preparing Your Core Network for 5G RedCap, Oracle. White Paper."},{"key":"ref_36","unstructured":"User Equipment (UE) Radio Access Capabilities (Release 17). Standard No. 3GPP. TS 38.306: NR. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.306\/."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Saafi, S., Vikhrova, O., Andreev, S., and Hosek, J. (2022, January 16\u201320). Enhancing Uplink Performance of NR RedCap in Industrial 5G\/B5G Systems. Proceedings of the 2022 IEEE International Conference on Communications Workshops (ICC Workshops), Seoul, Republic of Korea.","DOI":"10.1109\/ICCWorkshops53468.2022.9814497"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Ferdous, N.S., Hassan, M.Z., Ahmed, I., and Akter, L. (2024, January 29\u201331). Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road Map. Proceedings of the 2024 7th Conference on Cloud and Internet of Things (CIoT), Montreal, QC, Canada.","DOI":"10.1109\/CIoT63799.2024.10757145"},{"key":"ref_39","unstructured":"Study on Enhancements for RAN Analytics. Standard No. 3GPP. TR 37.817. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/37_series\/37.817\/."},{"key":"ref_40","unstructured":"Study on Artificial Intelligence (AI)\/Machine Learning (ML) for NR Air Interface. Standard No. 3GPP. TR 38.843. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.843\/."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"111650","DOI":"10.1016\/j.comnet.2025.111650","article-title":"Joint operating mode and resource allocation optimization in wireless-powered RIS-assisted multiuser communication systems","volume":"272","author":"Yuan","year":"2025","journal-title":"Comput. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhang, W., and Huang, G. (2025, January 18\u201320). A Novel Energy-Efficiency Optimization Framework for Wireless-Powered RIS-Assisted Communication Systems. Proceedings of the 2025 7th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT), Guangzhou, China.","DOI":"10.1109\/ECNCT66493.2025.11172421"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, Y., Wang, N., Zhao, Q., and Hu, W. (2024, January 15\u201317). Design and Application Exploration of Scenario Video Surveillance Based on RedCap Module. Proceedings of the 2024 4th International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR 2024), Chengdu, China.","DOI":"10.1145\/3718751.3718837"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1722","DOI":"10.1016\/j.dcan.2025.06.007","article-title":"Balancing sustainability and security: A review of 5G and IoT in smart cities","volume":"11","author":"Aldehim","year":"2025","journal-title":"Digit. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"110792","DOI":"10.1016\/j.comnet.2024.110792","article-title":"Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment","volume":"254","author":"Beschastnyi","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","article-title":"A Survey on Security Aspects for 3GPP 5G Networks","volume":"22","author":"Cao","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Abdollahi, M., Malekinasab, K., Tu, W., and Bag-Mohammadi, M. (2021, January 4\u20137). An Efficient Metric for Physical-layer Jammer Detection in Internet of Things Networks. Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada.","DOI":"10.1109\/LCN52139.2021.9524936"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"70425","DOI":"10.1109\/ACCESS.2023.3293404","article-title":"Real-Time Jamming Detection in Wireless IoT Networks","volume":"11","author":"Zahra","year":"2023","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Rao, R., Marojevic, V., Reed, J., and Jover, R.P. (2018, January 19\u201323). 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation. Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA.","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Pourghasem, A., Kirner, R., Tsokanos, A., Mporas, I., and Mylonas, A. (2025). Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN. Future Internet, 17.","DOI":"10.3390\/fi17020068"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Hua, J., Sun, H., Shen, Z., Qian, Z., and Zhong, S. (2018, January 16\u201319). Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Shen, X., Gu, L., Yang, J., and Shen, S. (2025). Energy Efficiency Optimization for UAV-RIS-Assisted Wireless Powered Communication Networks. Drones, 9.","DOI":"10.3390\/drones9050344"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Dino, A., Giuliano, F., Mangione, S., Garlisi, D., and Tinnirello, I. (2025, January 4\u20138). Silent Drain: From Energy Profiling to Practical Denial-of-Energy Attacks in 5G. Proceedings of the ACM Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WINTECH \u201925), Hong Kong, China.","DOI":"10.1145\/3737895.3768308"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"101004","DOI":"10.1016\/j.iot.2023.101004","article-title":"EP-CuMAC: Energy and performance-efficient integrity protection for narrow-band IoT","volume":"25","author":"Sankaran","year":"2024","journal-title":"Internet Things"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Tikhvinskiy, V., Pastukh, A., Dymkova, S., and Varlamov, O. (2025). Compatibility Analysis Between RedCap Non-Public Networks and 5G NR in TDD FR1 and FR2 Bands. Inventions, 10.","DOI":"10.3390\/inventions10010012"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Niranjan, D.K., and Supriya, M. (2025). Assessing Security Weakness Through IoT Sensor Data Manipulation. Hybrid Intelligent Systems, Springer Nature.","DOI":"10.1007\/978-3-031-78928-1_33"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Wang, J., Shi, Y., Hu, D., Li, K., and Liu, X. (2024, January 23\u201326). CoCFL: A Lightweight Blockchain-based Federated Learning Framework in IoT Context. Proceedings of the 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS), Jersey City, NJ, USA.","DOI":"10.1109\/ICDCS60910.2024.00104"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1109\/TON.2025.3633764","article-title":"CoCFL: A Lightweight Blockchain-Based Federated Learning Framework for Large-Scale IoT Cluster","volume":"34","author":"Liu","year":"2025","journal-title":"IEEE Trans. Netw."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Ma, Y., Chang, C., Wu, P., Xiao, J., and Yuan, L. (2024). BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain. Electronics, 13.","DOI":"10.3390\/electronics13163120"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"S, B., Jain, K., and Krishnan, P. (2024, January 4\u20136). Securing IoT Devices with Enhanced Tiny Encryption Algorithm. Proceedings of the 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India.","DOI":"10.1109\/ICACRS62842.2024.10841704"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Pothumarti, R., Jain, K., and Krishnan, P. (2021). A Lightweight Authentication Scheme for 5G Mobile Communications: A Dynamic Key Approach. J. Ambient. Intell. Humaniz. Comput., 1\u201319.","DOI":"10.1007\/s12652-020-02857-4"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"101791","DOI":"10.1016\/j.phycom.2022.101791","article-title":"Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review","volume":"54","author":"Sharma","year":"2022","journal-title":"Phys. Commun."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Fakhouri, H.N., Alawadi, S., Awaysheh, F.M., Hani, I.B., Alkhalaileh, M., and Hamad, F. (2023). A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions. Electronics, 12.","DOI":"10.3390\/electronics12224604"},{"key":"ref_64","unstructured":"Antal, B., Kail, E., Ors\u00f3s, M., and B\u00e1n\u00e1ti, A. (2025, January 23\u201325). Simulation and detection methods of specific 5G attacks. Proceedings of the 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI), Star\u00e1 Lesn\u00e1, Slovakia."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Narayanan, V.A., and Sumesh, A.K. (2025). Malicious Attack Detection Using Deep Learning in IoT Network. Signal Processing, Telecommunication and Embedded Systems with AI and ML Applications, Proceedings of the 8th International Conference on Microelectronics Electromagnetics and Telecommunications (ICMEET 2023), Mizoram, India, 6\u20137 October 2023, Springer.","DOI":"10.1007\/978-981-97-8422-6_3"},{"key":"ref_66","unstructured":"Study on support of reduced capability NR devices. Standard No. 3GPP. TR 38.875. Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/38_series\/38.875\/."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/3\/118\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T10:52:21Z","timestamp":1772189541000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/3\/118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,27]]},"references-count":66,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["fi18030118"],"URL":"https:\/\/doi.org\/10.3390\/fi18030118","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,27]]}}}