參考文獻 |
[1] M. Gartner, Market Trend: 5G in Manufacturing Use Cases published: 31 May 2023
[2] A. Aijaz, “Private 5G: The future of industrial wireless,” IEEE Ind. Electron. Mag., vol. 14, no. 4, pp. 136–145, Dec. 2020.
[3] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, “Industrial Internet of Things: Challenges, oppor-tunities, and directions,” IEEE Trans. Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018.
[4] H. Viswanathan and P. E. Mogensen, “Communications in the 6G era,” IEEE Access, vol. 8, pp. 57 063–57074, 2020.A. Ghosh, A. Maeder, M. Baker, and D. Chandramouli, “5G evolution: A view on 5G cellular technology beyond 3GPP release 15,” IEEE Access, vol. 7, pp. 127 639–127651, 2019.
[5] M. Gundall et al., “Introduction of a 5G-enabled architecture for the realization of Industry 4.0 use cases,” IEEE Access, vol. 9, pp. 25 508– 25521, 2021.
[6] F. Tariq, M. R. A. Khandaker, K. -K. Wong, M. A. Imran, M. Bennis, and M. Debbah, “A speculative study on 6G,” IEEE Wireless Commun., vol. 27, no. 4, pp. 118–125, Aug. 2020.
[7] M. Giordani, M. Polese, M. Mezzavilla, S. Rangan, and M. Zorzi, “Toward 6G networks: Use cases and tech-nologies,” IEEE Commun. Mag., vol. 58, no. 3, pp. 55–61, Mar. 2020.
[8] G. Gui, M. Liu, F. Tang, N. Kato, and F. Adachi, “6G: Opening new horizons for integration of comfort, securi-ty, and intelligence,” IEEE Wireless Commun., vol. 27, no. 5, pp. 126–132, Oct. 2020.
[9] H. Tataria, M. Shafi, A. F. Molisch, M. Dohler, H. Sjöland, and F. Tufvesson, “6G wireless systems: Vision, re-quirements, challenges, insights, and opportunities,” Proc. IEEE, vol. 109, no. 7, pp. 1166–1199, Jul. 2021.
[10] K. B. Letaief, W. Chen, Y. Shi, J. Zhang, and Y. A. Zhang, “The roadmap to 6G: AI empowered wireless net-works,” IEEE Commun. Mag., vol. 57, no. 8, pp. 84–90, Aug. 2019.
[11] Z. Zhang et al., “6G wireless networks: Vision, requirements, architecture, and key technologies,” IEEE Veh. Technol. Mag., vol. 14, no. 3, pp. 28–41, Sep. 2019.
[12] 3GPP: Study on Channel Model for Frequencies From 0.5 to 100 GHz (Release 16), 3GPP TR 38.901, Version 16.1.0, Jan. 2020.
[13] I. Rodriguez et al., “5G swarm production: Advanced industrial manufacturing concepts enabled by wireless au-tomation,” IEEE Commun. Mag., vol. 59, no. 1, pp. 48–54, Jan. 2021.
[14] P. O’Donovan, K. Leahy, K. Bruton, and D. T. J. O’Sullivan, “An industrial big data pipeline for data-driven analytics maintenance applicationsin large-scale smart manufacturing facilities,” J. Big Data, vol. 2, no. 1,p. 25, Nov. 2015. [Online]. Available: https://doi.org/10.1186/s40537-015-0034-z
[15] T. Qu, S. P. Lei, Z. Z.Wang, D. X. Nie, X. Chen, and G. Q. Huang, “IoTbased real-time production logistics synchronization system under smart cloud manufacturing,” Int. J. Adv. Manuf. Technol., vol. 84, no. 1, pp. 147–164, Apr. 2016. [Online].Available: https://doi.org/10.1007/s00170-015-7220-1
[16] S. G. Pease et al., “An intelligent real-time cyber-physical toolset for energy and process prediction and optimi-sation in the future industrial internet of things,” Future Gener. Comput. Syst., vol. 79, pp. 815–829, 2018. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167739X1630382X
[17] T. H. Szymanski, “Supporting consumer services in a deterministic industrial internet core network,” IEEE Commun. Mag., vol. 54, no. 6, pp. 110–117, Jun. 2016.
[18] X. Jia, Q. Feng, T. Fan, and Q. Lei, “Rfid technology and its applications in internet of things (IoT),” in Proc. 2nd Int. Conf. Consum. Electron., Commun. Netw., 2012, pp. 1282–1285.
[19] M. C. Domingo, “An overview of the internet of things for people with disabilities,” J. Netw. Comput. Appl., vol. 35, no. 2, pp. 584–596, 2012.
[20] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
[21] International Electrotechnical Commission (IEC), IoT 2020: Smart and Secure IoT Platform. IEC, Switzerland, 2016.
[22] D. Ismail, M. Rahman, and A. Saifullah, “Low-power wide-area networks: Opportunities, challenges, and di-rections,” in Proc. WorkshopProgram 19th Int. Conf. Distrib. Comput. Netw., 2018, pp. 8:1–8:6.
[23] GSMA. (2016, Oct.). 3gpp low power wide area technologies.[Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2016/10/3GPP-Low-Power-Wide-Area-Technologies-GSMA-White-Paper.pdf
[24] A. Al-Fuqaha, A. Khreishah, M. Guizani, A. Rayes, and M. Mohammadi,Toward better horizontal integration among IoT services,” IEEE Commun. Mag., vol. 53, no. 9, pp. 72–79, Sep. 2015.
[25] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M.Ayyash, “Internet of things: A survey on ena-bling technologies, protocols, and applications,” IEEE Commun. Surv. Tut., vol. 17, no. 4,pp. 2347–2376, Fourthquarter 2015.
[26] [Online]https://fieldcommgroup.org/sites/dfault/files/plant_of_the_year/PotY_2009_Mitsubishi_Chem.pdf
[27] T. Rault, A. Bouabdallah, and Y. Challal, “Energy efficiency in wireless sensor networks: A top-down survey,” vol. 67, pp. 104–122, 2014.
[28] 3GPP. (2016, Jun.), Standardization of NB-IOT completed [Online] Available: http://www.3gpp.org/news-events/3gpp-news/1785-nb_iot_complete
[29] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proc. 52nd Annu. Des. Autom. Conf., 2015, p. 54.
[30] A. W. Atamli and A. Martin, “Threat-based security analysis for the internet of things,” in Proc. IEEE Int. Workshop Secure Internet Things, 2014, pp. 35–43.
[31] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, andS. Shieh, “IoT security: Ongoing chal-lenges and research opportunities,”in Proc. IEEE 7th Int. Conf. Service-Oriented Comput. Appl., 2014, pp. 230–234.
[32] R. Drath and A. Horch, “Industrie 4.0: Hit or Hype?” IEEE Ind. Electron.Mag., vol. 8, no. 2, pp. 56–48, June 2014.
[33] ITU-R, “IMT Vision – Framework and Overall Objectives of the Future Development of IMT for 2020 and Be-yond,” International Telecommunication Union (ITU), Recommendation ITU-R M.2083-0,Sept. 2015. [Online] https://www.itu.int/dms pubrec/itu-r/rec/m/R-REC-M.2083-0-201509-I!!PDF-E.pdf
[34] A. Aijaz and M. Sooriyabandara, “The Tactile Internet for Industries: A Review,” Proc. IEEE, vol. 107, no. 2, pp. 414–435, 2018.
[35] 3GPP, “Study on Positioning Use cases Stage 1 (Release 16),” 3rd Generation Partnership Research (3GPP), TR 22.872, Sept. 2018, v16.1.0.[Online]. https://www.3gpp.org/ftp/Specs/archive/22 series/22.872/
[36] 5G-ACIA white paper “5G Non-Public Networks for Industrial Scenarios”, https://www.5g-acia.org/fileadmin/5G-ACIA/Publikationen/5G-ACIA_White_Paper_5G_for_Non-Public_Networks_for_Industrial_Scenarios /WP_5G_NPN_2019_01.pdf, July 2019.
[37] 3GPP, “Network sharing; Architecture and functional description,” 3rd Generation Partnership Research (3GPP), TS 23.251, Sept. 2018, v15.1.0, https://www.3gpp.org/ftp/Specs/archive/23 series/23.251/
[38] 3GPP, “Study on Enhancement of 5G System (5GS) for Vertical and Local Area Network (LAN) Services (Re-lease 16),” 3rd Generation Partnership Research (3GPP), TR 23.734, June 2019, v16.2.0.
[39] Harbor Research, “The Private LTE Opportunity for Industrial and Commercial IoT,” Report, July 2017. https://harborresearch.com/private-lte-opportunity/
[40] 3GPP, “Study on NR-based Access to Unlicensed Spectrum,” 3rd Generation Partnership Research (3GPP), TR 38.889, Dec. 2018, v16.0.0. https://www.3gpp.org/ftp/Specs/archive/38 series/38.889/
[41] 3GPP, “Study on NR Industrial Internet of Things (IoT); (Release 16),” 3rd Generation Partnership Research (3GPP), TR 38.825, March 2019, v16.0.0. https://www.3gpp.org/ftp/Specs/archive/
[42] X. Foukas, G. Patounas, A. Elmokashfi, and M. K. Marina, “Network Slicing in 5G: Survey and Challenges,” IEEE Commun. Mag., vol. 55, no. 5, pp. 94–100, 2017.
[43] A. Kaloxylos, “A Survey and an Analysis of Network Slicing in 5G Networks,” IEEE Commun. Standards Mag., vol. 2, no. 1, pp. 60–65, 2018.
[44] I. Afolabi et al., “Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and So-lutions,” IEEE Commun.SurveysTuts., vol. 20, no. 3, pp. 2429–2453, 2018.
[45] F. Ansah, M. Majumder, H. de Meer, and J. Jasperneite, “Network Slicing: An Industry Perspective,” in IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, pp.1367–1370.
[46] A. L. Swindlehurst, E. Ayanoglu, P. Heydari, and F. Capolino, “Millimeter-wave massive mimo: The next wireless revolution?” IEEE Communications Magazine, vol. 52, no. 9, pp. 56–62, 2014.
[47] N. Docomo, “DOCOMO 5G white paper, 5G radio access: Requirements, concept and technologies,” White Paper, Jul, 2014.
[48] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 74–80, 201
[49] 3rd Generation Partnership Research (3GPP), Technical Specification Group Services and System Aspects, “3GPP system architecture evolution (SAE) - security architecture (Release 14),” 3GPP TS 33.401, V14.5.0, Jan. 2018.
[50] 3GPP TS 33.501, “Security architecture and procedures for 5G system”. [online] https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169
[51] 3GPP TR 38.913 Study on scenarios and requirements for next generation access technologies, [online] https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2996
[52] 3GPP TR 38.811 Study on New Radio (NR) to support non-terrestrial networks.[online] https://www.3gpp.org/ftp/Specs/archive/38_series/38.811/
[53] 3GPP TR 38.813 New frequency range for NR (3.3-4.2 GHz), [online] https://www.3gpp.org/ftp/Specs/archive/38_series/38.813/
[54] Ericsson, Security standards and their role in 5G, [online] https://www.ericsson.com/en/blog/2020/6/security-standards-role-in-5g
[55] Ericsson, Security considerations of Open RAN. [online] Available at: https://www.ericsson.com/en/security/security-considerations-of-open-ra
[56] 3GPP TS 38.861 Study on high power UE (power class 2) for one NR FDD band [online]https://www.3gpp.org/ftp/Specs/archive/38_series/38.861
[57] 3GPP TR 23.724 Study on Cellular Internet of Things (CIoT) support and evolution for the 5G System (5GS) [online]https://www.3gpp.org/ftp/Specs/archive/23_series/23.724
[58] B. Zhang, J. Yuan, Q. Qiu, X. J. Li, and F. Zhang, “Research on 5G security technology and development,” in Proceedings of "5G +" China Mobile Science and Technology Association,pp. 1–5, Beijing, China, 2019.
[59] J. Zhang, Y. Zhao, B. Chen, F. Hu, and K. Zhu, “Research on edge computing data security and privacy pro-tection,” Journalof Communications, vol. 39, no. 3, pp. 1–21, 2018
[60] China Mobile 5G Joint Innovation Center, 5G Slicing Security White Paper for Vertical Industries, China Mo-bile 5G Joint Innovation Center, 2018
[61] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila,and A. Gurtov, “Overview of 5G security chal-lenges and solutions,” IEEE Communications Standards Magazine, vol. 2,no. 1, pp. 36–43, 2018
[62] M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular net-works: a surveyof existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications, vol. 101,pp. 55–82, 201
[63] A. K. Das, S. Zeadally, and M. Wazid, “Lightweight authentication protocols for wearable devices,” Computers & Electrical Engineering, vol. 63, pp. 196–208, 2017
[64] Y. Wang, W. Chu, S. Fields, C. Heinemann, and Z. Reiter,“Detection of intelligent intruders in wireless sensor networks,”Future Internet, vol. 8, no. 4, p. 2, 2016
[65] A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intru-sion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016.
[66] Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial Internet of things: Challenges, oppor-tunities, and directions. IEEE Transactions on Industrial Informatics 14(11):4724-4734.
[67] Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access, 8:152351-152366.
[68] Vitturi S, Zunino C, Sauter T (2019) Industrial communication systems and their future challenges: Next-generation ethernet, IIoT, and 5G. Proceedings of the IEEE, 107(6):944-961.
[69] Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things secu-rity: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4):2489-2520.
[70] Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: A survey. Journal of Network and Computer Applications, 88:10-28.
[71] Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of Internet of things. Computer Science Review, 38:100312.
[72] Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: A top-down survey. Computer Net-works, 141:199-221.
[73] Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial Internet of things: A cyber-physical systems perspective. IEEE Access, 6:78238- 78259.
[74] Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial Internet of things: Challenges, oppor-tunities, and directions. IEEE Transactions on Industrial Informatics 14(11):4724-4734.
[75] Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things secu-rity: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4):2489-2520.
[76] Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: A survey. Journal of Network and Computer Applications, 88:10-28.
[77] Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of Internet of things. Computer Science Review, 38:100312.
[78] Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the internet of things era: An overview on security and pri-vacy challenges. Computer Networks, 179:107345.
[79] Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1):196-248.
[80] Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challeng-es and solutions. IEEE Communications Standards Magazine, 2(1):36-43.
[81] Wang Y, Pan Z, Yuan X, Yang C, Gui W (2020) A novel deep learning based fault diagnosis approach for chemical process with extended deep belief network. ISA Transactions 96:457-467.
[82] Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990-19999.
[83] Naik B, Obaidat, MS, Nayak J, Pelusi D, Vijayakumar P, Islam SH (2019) Intelligent secure ecosystem based on Metaheuristic and functional link neural network for edge of things. IEEE Transactions on Industrial Infor-matics, 16(3):1947-1956.
[84] Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Transactions on Industrial Informatics, 16(3):1963-1971.
[85] Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Guizani N (2019) Realtime lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Transactions on Industrial Informatics, 15(7):4285-4294.
[86] Yang C, Shi Z, Zhang H, Wu J, Shi X (2019) Multiple attacks detection in cyber-physical systems using ran-dom finite set theory. IEEE transactions on cybernetics, 50(9):4066-4075.
[87] Krithivasan K, Pravinraj S, VS SS (2020) Detection of cyberattacks in industrial control systems using en-hanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN). IEEE Transactions on Industry Applications, 56(4):4394-4404.
[88] Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Generation Computer Systems, 108:1230-1240.
[89] Wu H, Tian H, Fan S, Ren J (2020) Data age aware scheduling for wireless powered mobile-edge computing in industrial internet of things. IEEE Transactions on Industrial Informatics, 17(1):398-408.
[90] Li X, Wan J, Dai HN, Imran M, Xia M, Celesti A (2019) A hybrid computing solution and resource scheduling strategy for edge computin in smart manufacturing. IEEE Transactions on Industrial Informatics,5(7):4225-4234.
[91] Deng S, Xiang Z, Zhao P, Taheri J, Gao H, Yin J, Zomaya AY (2020) Dynamical resource allocation in edge for trustable Internet-of-Things systems: A reinforcement learning method. IEEE Transactions on Industrial In-formatics, 16(9):6103-6113.
[92] Zhang G, Chen Y, Shen Z, Wang L (2018) Distributed energy management for multiuser mobile-edge compu-ting systems with energy harvesting devices and QoS constraints. IEEE Internet of Things Journal,6(3):4035-4048.
[93] Messaoud S, Bradai A, Moulay E (2019) Online GMM clustering and mini-batch gradient descent based opti-mization for Industrial IoT 4.0.IEEE Transactions on Industrial Informatics, 16(2):1427-1435.
[94] Xiang H, Yan S, Peng M. (2020) A realization of fog-RAN slicing via deep reinforcement learning. IEEE Transactions on Wireless Communications, 19(4):2515-2527
[95] Qu K, Zhuang W, Ye Q, Shen X, Li X, Rao J (2020) Dynamic flow migration for embedded services in SDN/NFV-enabled 5G core networks. IEEE Transactions on Communications, 68(4):2394-2408.
[96] Estrada-Solano F, Caicedo OM, Da Fonseca NL (2019) Nelly: Flow detection using incremental learning at the server side of SDN-based datacenters. IEEE Transactions on Industrial Informatics, 16(2):1362-1372.
[97] Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud ar-chitecture. IEEE Internet of ThingsJournal, 7(4):3559-3570.
[98] Fang L, Zhao B, Li Y, Liu Z, Ge C, Meng W (2020) Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Network, 34(6):54-61.
[99] Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM (2020). An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal,7(9):8852-8859.
[100] Maimó LF, Celdrán AH, Pérez MG, Clemente FJG, Pérez GM (2019) Dynamic management of a deep learn-ing-based anomaly detection system for 5G networks. Journal of Ambient Intelligence and Humanized Compu-ting 10(8):3083-3097.
[101] Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT net-works through a reliable cyberattack detection model. IEEE Transactions on Industrial Informatics, 16(9):6154-6162.
[102] Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for Internet of things. Future Generation Computer Systems 82:761-768.
[103] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proceedings of the IEEE, 107(8), pp.1738- 1762, 2019.
[104] S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A.Y. Zomaya, “Edge intelligence: The confluence of edge computing and artificial intelligence,” IEEE Internet of Things Journal, 7(8), pp.7457-7469, 2020.
[105] G. Plastiras, M. Terzi, C. Kyrkou, and T. Theocharidcs, “Edge intelligence: Challenges and opportunities of near-sensor machine learning applications,” In 2018 IEEE 29th international conference on application-specific systems, architectures and processors (asap), pp. 1-7, IEEE, 2018.
[106] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge intelligence: Paving the last mile of artificial intelligence with edge computing,” Proceedings of the IEEE, 107(8), pp.1738- 1762, 2019.
[107] E. Li, Z. Zhou, and X. Chen, “Edge intelligence: On-demand deep learning model co-inference with device-edge synergy,” In Proceedings of the 2018 Workshop on Mobile Edge Communications, pp. 31-36, 2018.
[108] X. Zhang, Y. Wang, S. Lu, L. Liu, L. and W. Shi, “OpenEI: An open framework for Edge computing gatway ” In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1840-1851, IEEE, 2019
[109] J. Zhang and K.B. Letaief, “Mobile edge intelligence and computing for the internet of vehicles,” Proceedings of the IEEE, 108(2), pp.246-261, 2019.
[110] Y. Liu, M. Peng, G. Shou, Y. Chen, and S. Chen, “Toward edge intelligence: Multiaccess edge computing for 5G and Internet of Things,” IEEE Internet of Things Journal, 7(8), pp.6722-6747, 2020.
[111] K.P. Seng and L.M. Ang, “Embedded intelligence: state-of-the- art and research challenges,” IEEE Access, 10, pp.59236-59258, 2022.
[112] S. Xu, Y. Qian, and R.Q. Hu, “Edge intelligence assisted gateway defense in cyber security,” IEEE Network, 34(4), pp.14-19, 2020.
[113] S. Xu, Y. Qian, and R.Q. Hu, “Data-driven edge intelligence for robust network anomaly detection,” IEEE Transactions on Network Science and Engineering, 7(3), pp.1481-1492, 2019.
[114] S. Rajendran, S.K. Mathivanan, P. Jayagopal, K.P. Janaki,B.A.M.M. Bernard, S. Pandy, and M.S. Somana-than, “Emphasizing privacy and security of edge intelligence with machine learning for healthcare,” Internation-al Journal of Intelligent Computing and Cybernetics, 2021.
[115] Y. Li, Y. Yu, W. Susilo, Z. Hong, and M. Guizani, “Security and privacy for edge intelligence in 5G and be-yond networks: Challenges and solutions,” IEEE Wireless Communications, 28(2), pp.63-69, 2021.
[116] C. Dehury, S.N. Srirama, P.K. Donta, and S. Dustdar, “Securing clustered edge intelligence with blockchain,” IEEE Consumer Electronics Magazine, 2022.
[117] Y. An, F.R. Yu, J. Li, J. Chen, and V.C. Leung, “Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT),” IEEE Internet of Things Journal, 8(5), pp.3554-3566, 2020.
[118] P. Zhang, X. Yang, J. Chen, and Y. Huang, “A Survey of Testing for 5G: Solutions, Opportunities, and Chal-lenges,” China Communications, vol. 16, no. 1, pp. 69–85, 2019.
[119] M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, and M. Ylianttila, A Comprehensive Guide to 5G Security. Wiley Publishing, 2018.
[120] G. Maier and M. Reisslein, “Transport SDN at the Dawn of the 5G Era,” 2019.
[121] S. Sarraf, “5G Emerging Technology and Affected Industries: Quick Survey,” American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), vol. 55, no. 1, pp. 75–82, 2019.
[122] S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A Survey,” Journal of Industrial Information Integration, 2018.
[123] R. Ahmed, A. K. Malviya, M. J. Kaur, and V. P. Mishra, “Comprehensive Survey of Key Technologies Ena-bling 5G-IoT,” Available at SSRN 3351007, 2019.
[124] M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, “Software-Defined Mobile Networks Security,” Mobile Networks and Applications, vol. 21, no. 5, pp. 729–743, 2016.
[125] P. Gandotra and R. K. Jha, “A survey on green communication and security challenges in 5G wireless commu-nication networks,” Journal of Network and Computer Applications, vol. 96, pp. 39–61, 2017.
[126] A. K. Rangisetti and B. R. Tamma, “Software Defined Wireless Networks: A Survey of Issues and Solutions,” Wireless Personal Communications, vol. 97, no. 4, pp. 6019–6053, 2017.
[127] A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, “Software Defined Networking for Security Enhance-ment in Wireless Mobile Networks,” Computer Networks, vol. 66, pp. 94–101, 2014.
[128] G. Choudhary and V. Sharma, “A Survey on the Security and the Evolution of Osmotic and Catalytic Compu-ting for 5G Networks,” in 5G Enabled Secure Wireless Networks. Springer, 2019, pp. 69–102.
[129] D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, and C. P¨opper, “On Security Research towards Future Mo-bile Network Generations,” IEEE Communications Surveys & Tutorials, 2018.
[130] I. Alsmadi and D. Xu, “Security of Software Defined Networks: A, Survey,” computers & security, vol. 53, pp. 79–108, 2015.
[131] Q. Yan, F. R. Yu, Q. Gong, and J. Li, “Software-Defined Networking (SDN) and Distributed Denial of Ser-vice (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp.602–622, 2016.
[132] W. Yang and C. Fung, “A Survey On Security In Network Function Virtualization,” in NetSoft Conference and Workshops (NetSoft), 2016 IEEE. IEEE, 2016, pp. 15–19.
[133] H. Jang, J. Jeong, H. Kim, and J.-S. Park, “A Survey on Interfaces to Network Security Functions in Network Virtualization,” in Advanced Information Networking and Applications Workshops (WAINA), 2015 IEEE 29th International Conference on. IEEE, 2015, pp. 160–163.
[134] T. Dargahi, A. Caponi, M. Ambrosin, G. Bianchi, and M. Conti,A Survey on the Security of Stateful SDN Data Planes,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1701–1725,2017.
[135] P. Singh, P. Pawar, and A. Trivedi, “Physical Layer Security Approaches in 5G Wireless Communication Net-works,” in 2018 First International Conference on Secure Cyber Computing and Communication(ICSCCC). IEEE, 2019, pp. 477–482.
[136] S. K. Mohapatra, B. R. Swain, and P. Das, “Comprehensive Survey of Possible Security Issues on 4G Net-works,” International Journal of Network Security & Its Applications, vol. 7, no. 2, p. 61, 2015.
[137] J. Arkko, K. Norrman, M. Näslund and B. Sahlin, "A usim compatible 5g aka protocol with perfect forward se-crecy," in IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 1205– 1209, 2015.
[138] A. Koutsos, "The 5g-aka authentication protocol privacy," in IEEE European Symposium on Security and Pri-vacy (EuroS P), Stockholm, Sweden, pp. 464–479, 2019.
[139] L. Wang, J. Liu, M. Chen, G. Gui and H. Sari, "Optimization-based access assignment scheme for physical-layer security in d2d communications underlying a cellular network," IEEE Transaction Vehicular Technology, vol. 67, no. 7, pp. 5766–5777, 2018.
[140] M.A. Rahman and E. Al-Shaer, "Automated syndissertation of distributed network access controls: a formal framework with refinement," IEEE Transaction Parallel Distributed System, vol. 28, no. 2, pp. 416–430, 2017.
[141] M. Khan, P. Ginzboorg, K. Jarvinen and V. Niemi, "Defeating the downgrade attack on identity privacy in 5g," In International Conference on Research in Security Standardisation, Darmstadt, vol. 11322, pp. 95-119, 2018.
[142] M.C. Dacier, H. König, R. Cwalinski, F. Kargl and S. Dietrich, "Security challenges and opportunities of soft-ware-defined networking," IEEE Security and Privacy, vol. 15, no. 2, pp. 96–100, 2017.
[143] A. R. Prasad, "3gpp 5g security," Journal of ICT Standardization, vol. 6, no. 2, pp. 137-158, 2018.
[144] C. Li and B. Palanisamy, "Privacy in internet of things: from principles to technologies," IEEE Internet Things Journal, vol. 6, no. 1, pp. 488–505, 2019.
[145] K. Yan, W. Shen, Q. Jin and H. Lu, "Emerging privacy issues and solutions in cyber-enabled sharing services: from multiple perspectives," IEEE Access, vol. 7, pp. 26031–26059, 2019.
[146] P.F. Scott, "Secrecy and surveillance: lessons from the law of imsi catchers," International Review of Law, Computers and Technology, vol. 33, no. 3, pp. 349-371, 2019.
[147] A. Braeken, M. Liyanage, P. Kumar and J. Murphy, "Novel 5g authentication protocol to improve the re-sistance against active attacks and malicious serving networks," IEEE Journals & Magazine, vol. 7, pp. 64040 - 64052, 2019.
[148] W. Shafik, S. M. Matinkhah, M. N. Sanda, and F. Shokoor, “Internet of things-based energy efficiency optimi-zation model in fog smart cities,” International Journal on Informatics Visualization, vol. 5, no. 2, pp. 105–112, 2021.
[149] W. Shafik and S. M. Matinkhah, “Unmanned aerial vehicles analysis to social networks performance,” CSI Journal on Computer Science and Engineering, vol. 18, no. 2, pp. 24-31, 2021.
[150] F. Pan, Z. Pang, M. Luvisotto, M. Xiao and H. Wen, "Physical-layer security for industrial wireless control sys-tems: basics and future directions," IEE Industrial. Electronic Magazine, vol. 12, no. 4, pp. 18–27, 2018.
[151] W. Shafik, S. M. Matinkhah and S. "Dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations," International Journal of Advances in Applied Sciences, 2252, no. 8814, pp. 8814, 2020.
[152] M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating critical security issues of the iot world: present and future challenges," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018.
[153] J. Pacheco, D. Ibarra, A. Vijay and S. Hariri, "IoT security framework for smart water system," in IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, pp. 1285– 1292, 2017.
[154] S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury and E. Bertino, "Insecure connection bootstrapping in cellular networks," Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Net-works, Miami, Florida, pp. 1-11, 2019.
[155] Peter Rost, Albert Banchs, Ignacio Berberana, Markus Breitbach, MarkDoll, Heinz Droste, Christian Mann-weiler, Miguel A Puente, Konstantinos Samdanis, and Bessem Sayadi. Mobile network architecture evolution toward 5g. IEEE Communications Magazine, 54(5):84–91, 2016.
[156] Tobias Engel. Locating mobile phones using signalling system 7. In 25th Chaos communication congress, 2008.
[157] Tobias Engel, Day Day, Room Saal, and Track Hacking. Locating mobile phones using ss7. In 25th Chaos Communication Congress, 2009.
[158] Tobias Engel. SS7: Locate. track. manipulate. In FTP: http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/or iginal/31c3-ss7-locate-track-manipulate. pdf, 2014.
[159] Karsten Nohl and Luca Melette. Defending mobile phones. In The 28th Chaos Communication Congress, 2011.
[160] Roger Piqueras Jover. Security analysis of sms as a second factor of authentication:The challenges of multifactor authentication based on sms,including cellular security deciencies, ss7 exploits, and sim swapping.Queue, 18(4):37–60, 2020.
[161] Positive Technologies. Ss7 network security analysis report.https://positive-tech.com/knowledge-base/research/ss7-network-securityanalysis-2020/. Accessed: 2021-15-02.Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1704.
[162] Assaf Klinger. Technical report on ss7 vulnerabilities and mitigationmeasures for digital nancial services transactions. https://www.itu.int/en/ITU/extcoop/figisymposium/Documents/ITU_SIT_WG_Technical%20report%20on%20the%20SS7%20vulnerabilities%20and%20their%20impact%20on%20DFS%20transactions_f.pdf. Accessed: 2021-15-02.
[163] Global System for Mobile Communications (GSMA). IMEI Database. https://imeidb.gsma.com/imei/index#. Accessed: 2020-10-12.
[164] 3rd Generation Partnership Research (3GPP). TS 33.210: Network Domain Security (NDS); IP network layer security. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId= 2279
[165] 3rd Generation Partnership Research (3GPP). TS 29.305: InterWorking Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=1704.
[166] 3rd Generation Partnership Research (3GPP). TR 29.805: InterWorking Function (IWF) between MAP based and Diameter based interfaces. https://portal.3gpp.org/desktopmodules/Specifications/ SpecificationDe-tails.aspx?specificationId=1741.
[167] Bill Welch. Exploiting the weaknesses of SS7. Network Security, 2017(1):17–19, 2017. Elsevier.
[168] Dan Forsberg, Gu¨nther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi.LTE security. John Wiley & Sons, 2012.
[169] Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, and Songwu Lu. New security threats caused by IMS-based SMS service in 4G LTE networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 1118–1130, 2016.
[170] Sergey Mashukov. Diameter Security: An Auditor’s Viewpoint. Journal of ICT Standardization, 5(1):53–68, 2017. River Publishers.
[171] Hsin Yi Chen “Domain-specific Threat Modeling for Mobile Communication Systems”, Master’s Dissertation, July 14, 2021 Aalto University
[172] A. Zaidi et al., “Cellular IoT evolution for industry digitalization,” Ericsson White Paper, GFMC-19, vol. 17, 2019.
[173] M. Ehret and J. Wirtz, “Unlocking value from machines: Business models and the industrial Internet of Things,” J. Marketing Manage., vol. 33,nos. 1/2, pp. 111–130, 2017.
[174] H. Viswanathan and P. E. Mogensen, “Communications in the 6G era,” IEEE Access, vol. 8, pp. 57 063–57074, 2020
[175] E. Manavalan and K. Jayakrishna, ‘‘A review of Internet of Things (IoT) embedded sustainable supply chain for industry 4.0 requirements,’’ Comput. Ind. Eng., vol. 127, pp. 925–953, Jan. 2019.
[176] Theodore J Williams. The purdue enterprise reference architecture. Computers in industry, 24(2):141–158,1994.
[177] Nokia, “Embrace Industry 4.0 with digitalization” https://www.nokia.com/networks/private-wireless/#embrace-industry-4-0-operations.
[178] Ericsson, “5G Business Potential from Industry Digitalization”, July, 2018 https://www.itu.int/en/ITU-D/Regional-Pres-ence/Europe/Documents/Events/2018/5GHungary/S4%20Sylvana%20Apicella%205G%20Business%20Potential%20from%20Industry%20Digitalization%20Rev.A%20External.pdf
[179] Checkpoint, “ICS Security Best Practices”,https://www.checkpoint.com/cyber-hub/network-security/what-is-industrial-control-systems-ics-security/ics-security-best-practices/
[180] Packt, ”The Purdue model for Industrial control systems ” https://subscription.packtpub.com/book/security/9781788395151/1/ch01lvl1sec10/the-purdue-model-for-industrial-control-systems
[181] ENISA. ENISA threat landscape for 5G Networks, 2020. https://www. enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks.Accessed 17.06.2021.
[182] MITRE FiGHT (5G Hierarchy of Threats) knowledge base of adversary Tactics and Techniques, https://fight.mitre.org/
[183] Trend Micro and Telecom Technology Center (TTC), “How a Packet Reflection Vulnerability Could Allow At-tackers to Infiltrate Internal 5G Networks” June, 2023 |