Cybersecurity Cover Image

  • Search by keyword
  • Search by citation

Page 1 of 5

In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when i...

  • View Full Text

Atomic cross-chain swap based on private key exchange

Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume spec...

HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy

Using deep learning models to deal with the classification tasks in network traffic offers a new approach to address the imbalanced Internet of Things malicious traffic classification problems. However, the em...

Key derivable signature and its application in blockchain stealth address

Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS) to capture the functionality and security requirements of SA...

Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy

The existing physical layer security schemes, which are based on the key generation model and the wire-tap channel model, achieve security by utilizing channel reciprocity entropy and noise entropy, respective...

Dissecting zero trust: research landscape and its implementation in IoT

As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This pap...

Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges

Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology and co...

A multi-agent adaptive deep learning framework for online intrusion detection

The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based (DL-based) IDSes are proposed to auto-extract high-level featur...

Iterative and mixed-spaces image gradient inversion attack in federated learning

As a distributed learning paradigm, federated learning is supposed to protect data privacy without exchanging users’ local data. Even so, the gradient inversion attack , in which the adversary can reconstruct the ...

Winternitz stack protocols for embedded systems and IoT

This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an  oracle. Mutually mistrustful Alice and Bob are able to agree and sign a series of do...

Joint contrastive learning and belief rule base for named entity recognition in cybersecurity

Named Entity Recognition (NER) in cybersecurity is crucial for mining information during cybersecurity incidents. Current methods rely on pre-trained models for rich semantic text embeddings, but the challenge...

DTA: distribution transform-based attack for query-limited scenario

In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually res...

A survey on lattice-based digital signature

Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an impo...

Shorter ZK-SNARKs from square span programs over ideal lattices

Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn consid...

Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a po...

Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks

Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolu...

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods

Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure...

A circuit area optimization of MK-3 S-box

In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th...

Intrusion detection system for controller area network

The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming incre...

CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification

Due to the anonymous and contract transfer nature of blockchain cryptocurrencies, they are susceptible to fraudulent incidents such as phishing. This poses a threat to the property security of users and hinder...

Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity

In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a critical challenge, especially in the context of memory dumps. This research paper presents a novel machine learning-bas...

BRITD: behavior rhythm insider threat detection with time awareness and user adaptation

Researchers usually detect insider threats by analyzing user behavior. The time information of user behavior is an important concern in internal threat detection.

cyber security research paper 2020

F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android

Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security. Machine learning and deep learning have become mainstream methods to analyze traffic, and ...

WAS: improved white-box cryptographic algorithm over AS iteration

The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and in...

Full-round impossible differential attack on shadow block cipher

Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices. Impossible dif...

Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP

The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the advent of the extended Shor’s algorithm, there is concern that E...

Towards the transferable audio adversarial attack via ensemble methods

In recent years, deep learning (DL) models have achieved significant progress in many domains, such as autonomous driving, facial recognition, and speech recognition. However, the vulnerability of deep learnin...

LayerCFL: an efficient federated learning with layer-wised clustering

Federated Learning (FL) suffers from the Non-IID problem in practice, which poses a challenge for efficient and accurate model training. To address this challenge, prior research has introduced clustered FL (C...

A novel botnet attack detection for IoT networks based on communication graphs

Intrusion detection systems have been proposed for the detection of botnet attacks. Various types of centralized or distributed cloud-based machine learning and deep learning models have been suggested. Howeve...

cyber security research paper 2020

Machine learning based fileless malware traffic classification using image visualization

In today’s interconnected world, network traffic is replete with adversarial attacks. As technology evolves, these attacks are also becoming increasingly sophisticated, making them even harder to detect. Fortu...

Research on privacy information retrieval model based on hybrid homomorphic encryption

The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is...

Performance evaluation of Cuckoo filters as an enhancement tool for password cracking

Cyberthreats continue their expansion, becoming more and more complex and varied. However, credentials and passwords are still a critical point in security. Password cracking can be a powerful tool to fight ag...

Tor network anonymity evaluation based on node anonymity

In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,...

Verifiable delay functions and delay encryptions from hyperelliptic curves

Verifiable delay functions (VDFs) and delay encryptions (DEs) are two important primitives in decentralized systems, while existing constructions are mainly based on time-lock puzzles. A disparate framework ha...

MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference

The popularity of small office and home office routers has brought convenience, but it also caused many security issues due to vulnerabilities. Black-box fuzzing through network protocols to discover vulnerabi...

A deep learning aided differential distinguisher improvement framework with more lightweight and universality

In CRYPTO 2019, Gohr opens up a new direction for cryptanalysis. He successfully applied deep learning to differential cryptanalysis against the NSA block cipher SPECK32/64, achieving higher accuracy than trad...

Attack based on data: a novel perspective to attack sensitive points directly

Adversarial attack for time-series classification model is widely explored and many attack methods are proposed. But there is not a method of attack based on the data itself. In this paper, we innovatively pro...

Improved lower bound for the complexity of unique shortest vector problem

Unique shortest vector problem (uSVP) plays an important role in lattice based cryptography. Many cryptographic schemes based their security on it. For the cofidence of those applications, it is essential to c...

cyber security research paper 2020

Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms

Blockchain technology has gained widespread adoption in recent years due to its ability to enable secure and transparent record-keeping and data transfer. A critical aspect of blockchain technology is the use ...

Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems such as powe...

Generic attacks on small-state stream cipher constructions in the multi-user setting

Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight de...

Evicting and filling attack for linking multiple network addresses of Bitcoin nodes

Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk

Ethereum’s high attention, rich business, certain anonymity, and untraceability have attracted a group of attackers. Cybercrime on it has become increasingly rampant, among which scam behavior is convenient, c...

An efficient permutation approach for SbPN-based symmetric block ciphers

It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-...

IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data

Vertical Federated Learning (VFL) has many applications in the field of smart healthcare with excellent performance. However, current VFL systems usually primarily focus on the privacy protection during model ...

Intrusion detection systems for wireless sensor networks using computational intelligence techniques

Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utiliz...

Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm

It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, f...

Continuously non-malleable codes from block ciphers in split-state model

Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve. It ensures with high probability that decoded message is either c...

Use of subword tokenization for domain generation algorithm classification

Domain name generation algorithm (DGA) classification is an essential but challenging problem. Both feature-extracting machine learning (ML) methods and deep learning (DL) models such as convolutional neural n...

  • Editorial Board
  • Sign up for article alerts and news from this journal

Affiliated with

New Content Item

The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • EBSCO Discovery Service
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

2022 Citation Impact 3.1 - 2-year Impact Factor 4.8 - 5-year Impact Factor 2.071 - SNIP (Source Normalized Impact per Paper) 1.266 - SJR (SCImago Journal Rank)

2023 Speed 8 days submission to first editorial decision for all manuscripts (Median) 95 days submission to accept (Median)

2023 Usage  408,523 downloads 15 Altmetric mentions 

  • ISSN: 2523-3246 (electronic)
  • Search Menu
  • Sign in through your institution
  • Editor's Choice
  • Author Guidelines
  • Submission Site
  • Open Access
  • About Journal of Cybersecurity
  • Editorial Board
  • Advertising and Corporate Services
  • Journals Career Network
  • Self-Archiving Policy
  • Journals on Oxford Academic
  • Books on Oxford Academic

Browse issues

Issue Cover

Cover image

issue cover

Volume 9, Issue 1, 2023

Research papers, classifying social media bots as malicious or benign using semi-supervised machine learning.

  • View article
  • Supplementary data

The nature of losses from cyber-related events: risk categories and business sectors

Contribution threat perception, school climate and prejudice as mediator to student’s cyber aggression, post-quantum cryptographic assemblages and the governance of the quantum threat, juror interpretations of metadata and content information: implications for the going dark debate, adapting cybersecurity practice to reduce wildlife cybercrime, tell me more, tell me more: repeated personal data requests increase disclosure, the power of beliefs in us cyber strategy: the evolving role of deterrence, norms, and escalation, maximizing the benefits from sharing cyber threat intelligence by government agencies and departments, development of a new ‘human cyber-resilience scale’, the security mindset: characteristics, development, and consequences, defining the reporting threshold for a cybersecurity incident under the nis directive and the nis 2 directive, a systematization of voter registration security, realizing credible remote agricultural auditing with trusted video technology, testing human ability to detect ‘deepfake’ images of human faces, a close look at a systematic method for analyzing sets of security advice, digital fingerprinting for identifying malicious collusive groups on twitter, the concept of modern political confrontation in cyber space, predictive taxonomy analytics (lasso): predicting outcome types of cyber breach, executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception, from russia with fear: fear appeals and the patterns of cyber-enabled influence operations, cybersecurity in uk universities: mapping (or managing) threat intelligence sharing within the higher education sector, learning about simulated adversaries from human defenders using interactive cyber-defense games, efficient collective action for tackling time-critical cybersecurity threats, email alerts, affiliations.

  • Online ISSN 2057-2093
  • Print ISSN 2057-2085
  • Copyright © 2024 Oxford University Press
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/publications/2020-cybersecurity-and-privacy-annual-report

2020 Cybersecurity and Privacy Annual Report

Download paper, additional citation formats.

  • Google Scholar

If you have any questions about this publication or are having problems accessing it, please contact [email protected] .

  • Android Malware 22
  • Artificial Intelligence 4
  • Check Point Research Publications 373
  • Cloud Security 1
  • Data & Threat Intelligence 1
  • Data Analysis 0
  • Global Cyber Attack Reports 305
  • How To Guides 11
  • Ransomware 1
  • Russo-Ukrainian War 1
  • Security Report 1
  • Threat and data analysis 0
  • Threat Research 170
  • Web 3.0 Security 8

cyber security research paper 2020

The 2020 Cyber Security Report

Crypto miners, targeted ransomware and cloud attacks dominate the threat landscape.

Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, we offer a review of 2019’s major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep your organization safe from cyber attacks. With the popularity of cloud computing and network-connected smartphones, it’s no secret that there are more ways to invade an organization. A once hardened network perimeter is now blurred and porous to cyber attacks, and the bad actors are well aware. If there’s one clear takeaway from 2019, it’s that no organization, big or small, is immune from a devastating cyber attack. Cyber exploits are more sophisticated, illusive, and targeted than ever before. With cybercrime rates estimated to have generated US$1.5 trillion in 2018, navigating today’s complex cyber threat landscape requires comprehensive cyber security.

In 2019, becoming an under protected, “sweet spot” for hacking was dangerous for entire industries. A large number of state and local public sector agencies were ravaged by ransomware attacks . In some cases, entire local governments were forced to declare a state of emergency due to the massive leaks of sensitive data and loss of services. In this 2020 Cyber Security Annual Report, we provide you with a timeline of 2019’s significant cyber events, including their relevant facts and insights. By analyzing our telemetric, product and vulnerability research, and our own ThreatCloud threat intelligence, we offer a detailed analysis of the cyber trends you need to consider. We then offer our 2020 vision which includes cyber security predictions. Finally, we offer recommendations on cyber protection strategies, using security “hygiene” best practices, advanced technology, and the focus on prevention, not detection or remediation. In order to adopt a winning strategy against zero-day, unknown cyber attacks, prevention should be considered.

GET YOUR CYBER SECURITY REPORT NOW  

cyber security research paper 2020

POPULAR POSTS

cyber security research paper 2020

  • Artificial Intelligence
  • Check Point Research Publications

cyber security research paper 2020

  • Threat Research

cyber security research paper 2020

BLOGS AND PUBLICATIONS

cyber security research paper 2020

  • Global Cyber Attack Reports

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

cyber security research paper 2020

“The Next WannaCry” Vulnerability is Here

cyber security research paper 2020

‘RubyMiner’ Cryptominer Affects 30% of WW Networks

cyber security research paper 2020

SUBSCRIBE TO CYBER INTELLIGENCE REPORTS

Country —Please choose an option— China India United States Indonesia Brazil Pakistan Nigeria Bangladesh Russia Japan Mexico Philippines Vietnam Ethiopia Egypt Germany Iran Turkey Democratic Republic of the Congo Thailand France United Kingdom Italy Burma South Africa South Korea Colombia Spain Ukraine Tanzania Kenya Argentina Algeria Poland Sudan Uganda Canada Iraq Morocco Peru Uzbekistan Saudi Arabia Malaysia Venezuela Nepal Afghanistan Yemen North Korea Ghana Mozambique Taiwan Australia Ivory Coast Syria Madagascar Angola Cameroon Sri Lanka Romania Burkina Faso Niger Kazakhstan Netherlands Chile Malawi Ecuador Guatemala Mali Cambodia Senegal Zambia Zimbabwe Chad South Sudan Belgium Cuba Tunisia Guinea Greece Portugal Rwanda Czech Republic Somalia Haiti Benin Burundi Bolivia Hungary Sweden Belarus Dominican Republic Azerbaijan Honduras Austria United Arab Emirates Israel Switzerland Tajikistan Bulgaria Hong Kong (China) Serbia Papua New Guinea Paraguay Laos Jordan El Salvador Eritrea Libya Togo Sierra Leone Nicaragua Kyrgyzstan Denmark Finland Slovakia Singapore Turkmenistan Norway Lebanon Costa Rica Central African Republic Ireland Georgia New Zealand Republic of the Congo Palestine Liberia Croatia Oman Bosnia and Herzegovina Puerto Rico Kuwait Moldov Mauritania Panama Uruguay Armenia Lithuania Albania Mongolia Jamaica Namibia Lesotho Qatar Macedonia Slovenia Botswana Latvia Gambia Kosovo Guinea-Bissau Gabon Equatorial Guinea Trinidad and Tobago Estonia Mauritius Swaziland Bahrain Timor-Leste Djibouti Cyprus Fiji Reunion (France) Guyana Comoros Bhutan Montenegro Macau (China) Solomon Islands Western Sahara Luxembourg Suriname Cape Verde Malta Guadeloupe (France) Martinique (France) Brunei Bahamas Iceland Maldives Belize Barbados French Polynesia (France) Vanuatu New Caledonia (France) French Guiana (France) Mayotte (France) Samoa Sao Tom and Principe Saint Lucia Guam (USA) Curacao (Netherlands) Saint Vincent and the Grenadines Kiribati United States Virgin Islands (USA) Grenada Tonga Aruba (Netherlands) Federated States of Micronesia Jersey (UK) Seychelles Antigua and Barbuda Isle of Man (UK) Andorra Dominica Bermuda (UK) Guernsey (UK) Greenland (Denmark) Marshall Islands American Samoa (USA) Cayman Islands (UK) Saint Kitts and Nevis Northern Mariana Islands (USA) Faroe Islands (Denmark) Sint Maarten (Netherlands) Saint Martin (France) Liechtenstein Monaco San Marino Turks and Caicos Islands (UK) Gibraltar (UK) British Virgin Islands (UK) Aland Islands (Finland) Caribbean Netherlands (Netherlands) Palau Cook Islands (NZ) Anguilla (UK) Wallis and Futuna (France) Tuvalu Nauru Saint Barthelemy (France) Saint Pierre and Miquelon (France) Montserrat (UK) Saint Helena, Ascension and Tristan da Cunha (UK) Svalbard and Jan Mayen (Norway) Falkland Islands (UK) Norfolk Island (Australia) Christmas Island (Australia) Niue (NZ) Tokelau (NZ) Vatican City Cocos (Keeling) Islands (Australia) Pitcairn Islands (UK)

We value your privacy!

BFSI uses cookies on this site. We use cookies to enable faster and easier experience for you. By continuing to visit this website you agree to our use of cookies.

IoT cybersecurity in 5G and beyond: a systematic literature review

  • Regular Contribution
  • Published: 28 May 2024

Cite this article

cyber security research paper 2020

  • Sandeep Pirbhulal 1   na1 ,
  • Sabarathinam Chockalingam 2   na1 ,
  • Ankur Shukla 2   na1 &
  • Habtamu Abie 1  

84 Accesses

Explore all metrics

The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as transportation, healthcare, and energy. There are several advantages of 5G and beyond for IoT applications like high speed and low latency. However, they are prone to cybersecurity threats due to networks softwarization and virtualization, thus raising additional security challenges and complexities. In this paper, we conducted a systematic literature review (SLR) of cybersecurity for 5G and beyond-enabled IoT. By developing a taxonomy to classify and characterize existing research, we identified and analyzed strategies, key patterns, mechanisms, performance evaluation, validation parameters and challenges of cybersecurity and resilience for 5G and beyond-enabled IoT in existing studies. We used “Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA)” recommendations for this SLR. Through our search in scientific databases, 4449 records published between 2017 and 2023 were initially identified, which were then reduced to 558 records after title and abstract screening to be considered for the eligibility check process. After screening the full-text, 79 articles were finalized for thorough analysis. The findings of this study suggest that 35% of the included studies focus on authentication and access control as security aspects, 59% studies are based on combination of both network layer and application layer as main operation layer, and 34% of the included studies use real-time implementation for validation purpose while the remaining studies utilize simulation or theoretical analysis. Our SLR also highlights open research challenges of 5G and beyond-enabled IoT cybersecurity and suggests a tentative solution for each challenge, which can be a focus of future research. Finally, key limitations of our SLR and threats to validity are addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

cyber security research paper 2020

Similar content being viewed by others

cyber security research paper 2020

Internet of Things (IoT), Applications and Challenges: A Comprehensive Review

cyber security research paper 2020

FGCF: fault-aware green computing framework in software-defined social internet of vehicle

cyber security research paper 2020

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Data availability.

Authors confirm that all relevant data are included in the article.

Heidari, A., Jabraeil Jamali, M.A.: Internet of Things intrusion detection systems: a comprehensive review and future directions. Clust. Comput. 26 (6), 3753–3780 (2023)

Article   Google Scholar  

Nord, J.H., Koohang, A., Paliszkiewicz, J.: The Internet of Things: review and theoretical framework. Expert Syst. Appl. 133 , 97–108 (2019)

Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017 (2017)

Gartner, IoT Security Primer: Challenges and Emerging Practices (2020). https://www.gartner.com/en/doc/iot-security-primer-challenges-and-emerging-practices . Access date: 29.01.2024

US Homeland Security, 5G impacts on cybersecurity (2023). https://www.dhs.gov/sites/default/files/2023-09/23_0906_oia_01_5G_Security_508_Compliant.pdf . Access date: 29.01.2024

Al-Aqrabi, H., Johnson, A.P., Hill, R., Lane, P., Liu, L.: A multi-layer security model for 5G-enabled industrial Internet of Things. In: International Conference on Smart City and Informatization. Springer, pp. 279–292 (2019)

Chandra Shekhar Rao, V., Kumarswamy, P., Phridviraj, M., Venkatramulu, S., Subba Rao, V.: 5G enabled industrial internet of things (IIoT) architecture for smart manufacturing. In: Data Engineering and Communication Technology. Springer, pp. 193–201 (2021)

Guo, F., Yu, F.R., Zhang, H., Li, X., Ji, H., Leung, V.C.: Enabling massive IoT toward 6G: a comprehensive survey. IEEE Internet Things J.8(15), 11891-11915 (2021)

Woźniak, M., Zielonka, A., Sikora, A., Piran, M.J., Alamri, A.: 6G-enabled IoT home environment control using fuzzy rules. IEEE Internet Things J. 8 (7), 5442–5452 (2020)

Nguyen, D. C., Ding, M., Pathirana, P. N., Seneviratne, A., Li, J., Niyato, D., ... & Poor, H. V. . 6G Internet of Things: A comprehensive survey. IEEE Internet Things Journal, 9(1), 359-383 (2021)

Shah, Y., Sengupta, S.: A survey on classification of cyber-attacks on IoT and IIoT devices. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, pp. 0406–0413 (2020)

Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20 (4), 3453–3495 (2018)

Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6 (5), 8182–8201 (2019)

Eichhammer, P., et al.: Towards a robust, self-organizing IoT platform for secure and dependable service execution. Tagungsband des FB-SYS Herbsttreffens 2019 (2019)

Pothumarti, R., Jain, K., & Krishnan, P. . A lightweight authentication scheme for 5G mobile communications: a dynamic key approach. Ambient Intell. Hum. Comput.12, 1–19 (2021)

Munilla, J., Burmester, M., Barco, R.: An enhanced symmetric-key based 5G-AKA protocol. Comput. Netw. 198 , 108373 (2021)

Deebak, B., Fadi, A.-T.: A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. Comput. Commun. 181 , 293–308 (2022)

Choudhury, H.: HashXor: a lightweight scheme for identity privacy of IoT devices in 5G mobile network. Comput. Netw. 186 , 107753 (2021)

Ayub, M.F., Mahmood, K., Kumari, S., Sangaiah, A.K.: Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. Digit. Commun. Netw. 7 (2), 235–244 (2021)

Wang, H., He, D., Yu, J., Xiong, N.N., Wu, B.: RDIC: a blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distrib. Comput. 152 , 1–10 (2021)

Serrano, W.: The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. J. Netw. Comput. Appl. 175 , 102909 (2021)

Partida, A., Criado, R., Romance, M.: Visibility graph analysis of IOTA and IoTeX price series: an intentional risk-based strategy to use 5G for IoT. Electronics 10 (18), 2282 (2021)

Bohara, M.H., Patel, K., Saiyed, A., Ganatra, A.: Adversarial artificial intelligence assistance for secure 5G-enabled IoT. In: Blockchain for 5G-Enabled IoT. Springer, pp. 323–350 (2021)

Ahmad, S., Afzal, M.M.: Deployment of fog and edge computing in IoT for cyber-physical infrastructures in the 5G era. In: International Conference on Sustainable Communication Networks and Application. Springer, pp. 351–359 (2019)

Aileni, R.M., Suciu, G., Valderrama Sukuyama, C.A., Pasca, S.: Internet of Things and communication technology synergy for remote services in healthcare. In: IoT and ICT for Healthcare Applications. Springer, pp. 59–82 (2020)

Syalim, A., Anggorojati, B., Baek, J., Gerbi, D., You, I.: Aggregate authentication for massive Internet of Things in 5G networks. In: International Symposium on Mobile Internet Security. Springer, pp. 3–12 (2019)

Letafati, M., Kuhestani, A., Behroozi, H., Ng, D.W.K.: Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay. IEEE Trans. Wirel. Commun. 19 (10), 6771–6785 (2020)

Krishnan, P., Duttagupta, S., Achuthan, K.: SDN/NFV security framework for fog-to-things computing infrastructure. Softw. Pract. Exp. 50 (5), 757–800 (2020)

Sharma, V., You, I., Leu, F.-Y., Atiquzzaman, M.: Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102 , 38–57 (2018)

Thantharate, A., Paropkari, R., Walunj, V., Beard, C., Kankariya, P.: Secure5G: a deep learning framework towards a secure network slicing in 5G and beyond. In: 2020 10th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, pp. 0852–0857 (2020)

Kotulski, et al.: Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018 (1), 1–23 (2018)

Google Scholar  

Modarresi, A., Symons, J.: Technological heterogeneity and path diversity in smart home resilience: a simulation approach. Procedia Comput. Sci. 170 , 177–186 (2020)

Kalkan, K.: SUTSEC: SDN utilized trust based secure clustering in IoT. Comput. Netw. 178 , 107328 (2020)

Al-Aqrabi, H., Lane, P., Hill, R.: Performance evaluation of multiparty authentication in 5G IIoT environments. In: Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health. Springer, pp. 169–184 (2019)

Uddin, M.A., Stranieri, A., Gondal, I., Balasubramanian, V.: Blockchain leveraged decentralized IoT eHealth framework. Internet of Things 9 , 100159 (2020)

Nkenyereye, L., Liu, C.H., Song, J.: Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles. Future Gener. Comput. Syst. 95 , 488–499 (2019)

Gunathilake, N.A., Buchanan, W.J., Asif, R.: Next generation lightweight cryptography for smart IoT devices: implementation, challenges and applications. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, pp. 707–710 (2019)

Modarresi, A., Symons, J.: Modeling and graph analysis for enhancing resilience in smart homes. Procedia Comput. Sci. 160 , 197–205 (2019)

Hussain, R., Hussain, F., Zeadally, S.: Integration of VANET and 5G security: a review of design and implementation issues. Future Gener. Comput. Syst. 101 , 843–864 (2019)

Bocu, R., Iavich, M., Tabirca, S.: A real-time intrusion detection system for software defined 5G networks. In: International Conference on Advanced Information Networking and Applications. Springer, Cham, pp. 436–446 (2021)

Adil, M., Song, H., Khan, M. K., Farouk, A., Jin, Z.: 5G/6G-enabled metaverse technologies: taxonomy, applications, and open security challenges with future research directions. J. Netw. Comput. Appl. 223, 103828 (2024)

Abdellah, A.R., Mahmood, O.A., Kirichek, R., Paramonov, A., Koucheryavy, A.: Machine learning algorithm for delay prediction in IoT and tactile internet. Future Internet 13 (12), 304 (2021)

Mishra, L., Vikash, Varma, S.: Seamless health monitoring using 5G NR for internet of medical things. Wirel. Person. Commun. 120 (3), 2259–2289 (2021)

Dzogovic, B., Mahmood, T., Santos, B., Feng, B., Do, V. T., Jacot, N., Van Do, T.: Advanced 5g network slicing isolation using enhanced vpn+ for healthcare verticals. In: Smart Objects and Technologies for Social Good: 7th EAI International Conference, GOODTECHS 2021, Virtual Event, September 15–17, 2021, Proceedings 7. Springer, pp. 121–135 (2021)

Park, K., Park, Y.: On the security of a lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks. Appl. Sci. 12 (9), 4265 (2022)

Wen, Z., Pacherkar, H.S., Yan, G.: VET5G: a virtual end-to-end testbed for 5G network security experimentation. In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test, pp. 19–29 (2022)

Uslu, S., et al.: Trustability for resilient internet of things services on 5G multiple access edge cloud computing. Sensors 22 (24), 9905 (2022)

Miranda, C., Kaddoum, G., Boukhtouta, A., Madi, T., Alameddine, H.A.: Intrusion prevention scheme against rank attacks for software-defined low power IoT networks. IEEE Access 10 , 129970–129984 (2022)

Deebak, B.D., Al-Turjman, F., Nayyar, A.: Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimed. Tools Appl. 80 , 17103–17128 (2021)

Krishnan, P., Jain, K., Jose, P.G., Achuthan, K., Buyya, R.: SDN enabled QoE and security framework for multimedia applications in 5G networks. ACM Trans. Multimed. Comput. Commun. Appl. 17 (2), 1–29 (2021)

Fang, D., Qian, Y., Hu, R.Q.: Open issues and future research directions for security and privacy in 5G networks (2024)

SinghKaunert, B.C.: Integration of cutting-edge technologies such as Internet of Things (IoT) and 5G in health monitoring systems: a comprehensive legal analysis and futuristic outcomes. GLS Law J. 6 (1), 13–20 (2024)

Yadav, A.K., Misra, M., Pandey, P.K., Kaur, K., Garg, S., Chen, X.: A provably secure ECC-based multi-factor 5G-AKA authentication protocol. In: GLOBECOM 2022–2022 IEEE Global Communications Conference. IEEE, pp. 516–521 (2022)

Li, Y., Li, H., Liu, W., Liu, L., Chen, Y., Wu, J., et al.: A case for stateless mobile core network functions in space. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp. 298–313 (2022)

Rey, V., Sánchez, P.M.S., Celdrán, A.H., Bovet, G.: Federated learning for malware detection in IoT devices. Comput. Netw. 204 , 108693 (2022)

Gupta, S., Parne, B.L., Chaudhari, N.S., Saxena, S.: SEAI: secrecy and efficiency aware inter-gNB handover authentication and key agreement protocol in 5G communication network. Wirel. Person. Commun. 122 (4), 2925–2962 (2022)

Al Sibahee, M.A., et al.: Stochastic security ephemeral generation protocol for 5G enabled Internet of Things. In: International Conference on Internet of Things as a Service. Springer, Cham (2021)

Jain, V., Kumar, B., Gupta, A.: Cybertwin-driven resource allocation using deep reinforcement learning in 6G-enabled edge environment. J. King Saud Univ. Comput. Inf. Sci. 34 (8), 5708–5720 (2022)

Nyangaresi, V.O.: Terminal independent security token derivation scheme for ultra-dense IoT networks. Array 15 , 100210 (2022)

Yadav, A.K., Misra, M., Pandey, P.K., Braeken, A., Liyange, M.: An improved and provably secure symmetric-key based 5G-AKA protocol. Comput. Netw. 218 , 109400 (2022)

Zago, M., Pérez, M.G., Pérez, G.M.: Early DGA-based botnet identification: pushing detection to the edges. Clust. Comput. 1–16 (2021)

Kasera, R.K., Gour, S., Acharjee, T.: A comprehensive survey on IoT and AI based applications in different pre-harvest, during-harvest and post-harvest activities of smart agriculture. Comput. Electron. Agric. 216 , 108522 (2024)

Reshmi, T.R., Azath, M.: Improved self-healing technique for 5G networks using predictive analysis. Peer-to-Peer Netw. Appl. 14 (1), 375–391 (2021)

Wang, J., Li, J., Liu, J.: Digital twin-assisted flexible slice admission control for 5G core network: a deep reinforcement learning approach. Future Gener. Comput. Syst. 153 , 467–476 (2024)

Sankar, S.P., Subash, T.D., Vishwanath, N., Geroge, D.E.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. Peer-to-Peer Netw. Appl. 14 (1), 392–402 (2021)

Rahman, M.A., Hossain, M.S., Showail, A.J., Alrajeh, N.A., Alhamid, M.F.: A secure, private, and explainable IoHT framework to support sustainable health monitoring in a smart city. Sustain. Cities Soc. 72 , 103083 (2021)

Reebadiya, D., Rathod, T., Gupta, R., Tanwar, S., Kumar, N.: Blockchain-based secure and intelligent sensing scheme for autonomous vehicles activity tracking beyond 5g networks. Peer-to-Peer Netw. Appl. 14 , 2757–2774 (2021)

Kamil, I.A., Ogundoyin, S.O.: A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment. Comput. Commun. 170 , 1–18 (2021)

Sharma, R., Jindal, P., Singh, B.: Physical key generation using modified discrete wavelet transforms for the Internet of Things. Int. J. Comput. Digit. Syst. 15 (1), 207–220 (2024)

Aruna, M.G., Hasan, M.K., Islam, S., Mohan, K.G., Sharan, P., Hassan, R.: Cloud to cloud data migration using self sovereign identity for 5G and beyond. Clust. Comput. 25 (4), 2317–2331 (2022)

Xi, J., Zou, S., Xu, G., Lu, Y.: CrowdLBM: a lightweight blockchain-based model for mobile crowdsensing in the Internet of Things. Pervasive Mob. Comput. 84 , 101623 (2022)

Cabrini, F.H., de Castro Barros Filho, A., Maciel, D.B., Valiante Filho, F., Neto, A.J.V., Kofuji, S.T.: Helix Multi-layered: a context broker federation for an efficient cloud-to-things continuum. Ann. Telecommun. 77 (11–12), 867–879 (2022)

Ali, R.F., Muneer, A., Dominic, P.D.D., Taib, S.M.: Hyperledger fabric framework with 5G network for blockchain-based security of IoT smart home applications. In: 2021 International Conference on Decision Aid Sciences and Application (DASA). IEEE, pp. 1109–1114 (2021)

Bhattacharya, P., Patel, F., Tanwar, S., Kumar, N., Sharma, R.: MB-MaaS: mobile blockchain-based mining-as-a-service for IIoT environments. J. Parallel Distrib. Comput. 168 , 1–16 (2022)

Deng, X., et al.: Resilient deployment of smart nodes for improving confident information coverage in 5G IoT. ACM Trans. Sens. Netw. 18 (3), 1–21 (2022)

Rathnayake, D.J., Halgamuge, M.: Computation time estimation of switches and controllers process on 6G-based SDN-cyber security forensics architecture in the blockchain-based IoT environment. In: AI and Blockchain Technology in 6G Wireless Network. Springer, Singapore, pp. 135–164 (2022)

Wang, G., Xu, W., Wang, Y., Liu, H., Xiang, J., Tang, Z.: Application research of edge IoT proxy technology based on 5G in power demand side management system. In International Conference on Computer Engineering and Networks. Springer, Singapore, pp. 486–495 (2022)

Jadav, N.K., Nair, A.R., Gupta, R., Tanwar, S., Lakys, Y., Sharma, R.: AI‐driven network softwarization scheme for efficient message exchange in IoT environment beyond 5G. Int. J. Commun. Syst. e5336, 1–20 (2022)

Nyangaresi, V.O., Ahmad, M., Alkhayyat, A., Feng, W.: Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. Expert. Syst. 39 (10), e13126 (2022)

Lilhore, U.K., Dalal, S., Simaiya, S.: A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Comput. Secur. 136 , 103560 (2024)

Borgohain, P., Choudhury, H.: A lightweight D2D authentication protocol for relay coverage scenario in 5G mobile network. Comput. Netw. 225 , 109679 (2023)

de Jesus Martins, R., Wickboldt, J.A., Granville, L.Z.: Assisted monitoring and security provisioning for 5G microservices-based network slices with SWEETEN. J. Netw. Syst. Manag. 31 (2), 36 (2023)

Benlloch-Caballero, P., Wang, Q., Calero, J.M.A.: Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks. Comput. Netw. 222 , 109526 (2023)

Ge, Y., Zhu, Q.: GAZETA: GAme-theoretic ZEro-trust authentication for defense against lateral movement in 5G IoT networks. IEEE Trans. Inf. Forensics Secur. 19, 540–554 (2023)

Singh, G.: GBEAKA: group-based efficient authentication and key agreement protocol for LPIoMT using 5G. Internet Things 22 , 100688 (2023)

Alotaibi, A., Barnawi, A.: IDSoft: a federated and softwarized intrusion detection framework for massive internet of things in 6G network. J. King Saud Univ. Comput. Inf. Sci. 35 (6), 101575 (2023)

Alamer, A.M.A., Basudan, S.A.M., Hung, P.C.: A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems. Expert Syst. Appl. 214 , 119005 (2023)

Rajawat, A.S., Goyal, S.B., Bedi, P., Kautish, S., Shrivastava, D.P.: Analysis assaulting pattern for the security problem monitoring in 5G‐enabled sensor network systems with big data environment using artificial intelligence/machine learning. IET Wirel. Sens. Syst. 12049, 1–14 (2023)

Deebak, B.D., Hwang, S.O.: Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era. Comput. Netw. 225 , 109664 (2023)

Escaleira, P., Cunha, V.A., Gomes, D., Barraca, J.P., Aguiar, R.L.: Moving target defense for the cloud/edge telco environments. Internet Things 24 , 100916 (2023)

Nyangaresi, V.O., Ma, J., Al Sibahee, M.A., Abduljabbar, Z.A.: Packet replays prevention protocol for secure B5G networks. In: Proceedings of Seventh International Congress on Information and Communication Technology: ICICT 2022, London, Volume 2 (pp. 507–522). Springer, Singapore (2022)

Kaushik, A., Vadlamani, L.S.S., Hussain, M.M., Sahay, M., Singh, R., Singh, A.K., et al.: Post quantum public and private key cryptography optimized for IoT security. Wirel. Person. Commun. 129 (2), 893–909 (2023)

Patruni, M.R., Humayun, A.G.: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks. Int. J. Inf. Secur. 23(1), 679-698 (2023)

Alcaraz, C., Lopez, J.: Protecting digital twin networks for 6G-enabled industry 5.0 ecosystems. IEEE Netw. 37 (2), 302–308 (2023)

Xu, D., Yu, K., Zhen, L., Choo, K.K.R., Guizani, M.: Quantum learning on structured code with computing traps for secure URLLC in industrial IoT scenarios. IEEE Internet Things J. 10(18), 16516-16530 (2023)

Babu, E.S., Barthwal, A., Kaluri, R.: Sec-edge: trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Comput. Commun. 199 , 10–29 (2023)

Valadares, D.C., Will, N.C., Sobrinho, Á.Á.C., Lima, A.C., Morais, I.S., Santos, D.F.: Security challenges and recommendations in 5G-IoT scenarios. In: International Conference on Advanced Information Networking and Applications, pp. 558–573. Springer, Cham (2023)

Kumar, S., Banka, H., Kaushik, B.: Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wirel. Netw. 1–22 (2023)

Rajawat, A.S., Goyal, S.B., Chee, M.W., Kautish, S.: Securing the sustainable 5G enabled IoMT-Fog computing environment: a blockchain-based approach. In: International Conference on Sustainable Development through Machine Learning, AI and IoT, pp. 216–235. Springer, Cham (2023)

Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: International Workshop on Public Key Cryptography. Springer, pp. 257–273 (2006)

Yuan, Y., Zhan, Q., Huang, H.: Efficient unrestricted identity-based aggregate signature scheme. PLoS ONE 9 (10), e110100 (2014)

Madakam, S., Lake, V., Lake, V., Lake, V.: Internet of Things (IoT): A literature review. Journal of Computer and Communications 3 (05), 164 (2015)

Li, S., Xu, L.D., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17 (2), 243–259 (2015)

Farooq, M.S., Riaz, S., Abid, A., Umer, T., Zikria, Y.B.: Role of IoT technology in agriculture: a systematic literature review. Electronics 9 (2), 319 (2020)

Gómez-Chabla, R., Real-Avilés, K., Morán, C., Grijalva, P., Recalde, T.: IoT applications in agriculture: a systematic literature review. In: 2nd International Conference on ICTs in Agronomy and Environment. Springer, pp. 68–76 (2019)

Ben-Daya, M., Hassini, E., Bahroun, Z.: Internet of things and supply chain management: a literature review. Int. J. Prod. Res. 57 (15–16), 4719–4742 (2019)

Aryal, A., Liao, Y., Nattuthurai, P., Li, B.: The emerging big data analytics and IoT in supply chain management: a systematic review. Supply Chain Manag. Int. J. (2018)

Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2 (1), 1–8 (2020)

Kashani, M.H., Madanipour, M., Nikravan, M., Asghari, P., Mahdipour, E.: A systematic review of IoT in healthcare: applications, techniques, and trends. J. Netw. Comput. Appl. 192 , 103164 (2021)

Mahmood, M.R., Matin, M.A., Sarigiannidis, P., Goudos, S.K.: A comprehensive review on artificial intelligence/machine learning algorithms for empowering the future IoT toward 6G era. IEEE Access 10 , 87535–87562 (2022)

Qadir, Z., Le, K.N., Saeed, N., Munawar, H.S.: Towards 6G Internet of Things: recent advances, use cases, and open challenges. ICT express 9 (3), 296–312 (2023)

Kim, J.H.: 6G and Internet of Things: a survey. J. Manag. Anal. 8 (2), 316–332 (2021)

Hakak, S., Gadekallu, T.R., Maddikunta, P.K.R., Ramu, S.P., Parimala, M., De Alwis, C., Liyanage, M.: Autonomous vehicles in 5G and beyond: a survey. Veh. Commun. 39 , 100551 (2023)

Alotaibi, A., Barnawi, A.: Securing massive IoT in 6G: recent solutions, architectures, future directions. Internet Things 22 , 100715 (2023)

Bodkhe, U., Tanwar, S.: Network management schemes for IoT environment towards 6G: a comprehensive review. Microprocess. Microsyst. 103, 104928 (2023)

Akinbi, A.O.: Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks. Wiley Interdiscip. Rev. Forensic Sci. 5 (6), e1496 (2023)

Cook, J., Rehman, S.U., Khan, M.A.: Security and privacy for low power iot devices on 5g and beyond networks: challenges and future directions. IEEE Access (2023)

Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet Things 14 , 100365 (2021)

Macedo, E.L., et al.: On the security aspects of Internet of Things: a systematic literature review. J. Commun. Netw. 21 (5), 444–457 (2019)

Mao, B., Liu, J., Wu, Y., Kato, N.: Security and privacy on 6g network edge: A survey. IEEE Commun. Surv. Tutor. 25(2), 1095–1127 (2023)

Jahid, A., Alsharif, M.H., Hall, T.J.: The convergence of blockchain, IoT and 6G: potential, opportunities, challenges and research roadmap. J. Netw. Comput. Appl. 217, 103677 (2023)

Mahmood, A., Beltramelli, L., Abedin, S.F., Zeb, S., Mowla, N.I., Hassan, S.A., Sisinni, E., Gidlund, M.: Industrial IoT in 5G-and-beyond networks: vision, architecture, and design trends. IEEE Trans. Ind. Inf. 18 (6), 4122–4137 (2021)

Irram, F., Ali, M., Naeem, M., Mumtaz, S.: Physical layer security for beyond 5G/6G networks: emerging technologies and future directions. J. Netw. Comput. Appl. 206 , 103431 (2022)

Zhang, M., Fang, Y.: Security analysis and enhancements of 3g pp authentication and key agreement protocol. IEEE Trans. Wirel. Commun. 4 (2), 734–742 (2005). https://doi.org/10.1109/TWC.2004.84294

Asmare, F.M., Ayalew, L.G.: Security challenges in the transition to 4G mobile systems in developing countries. Cogent Eng. 10 (1), 2166214 (2023)

Salahdine, F., Han, T., Zhang, N.: Security in 5G and beyond recent advances and future challenges. Secur. Privacy 6 (1), e271 (2023)

Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3 , 1206–1232 (2015)

Li, Q.C., Niu, H., Papathanassiou, A.T., Wu, G.: 5G network capacity: key elements and technologies. IEEE Veh. Technol. Mag. 9 (1), 71–78 (2014)

Kumar, G.E.P., Lydia, M., Levron, Y. Security Challenges in 5G and IoT Networks: A Review. In: Velliangiri, S., Gunasekaran, M., Karthikeyan, P. (eds) Secure Communication for 5G and IoT Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. 1-13 (2022) https://doi.org/10.1007/978-3-030-79766-9_1

Fayed, M.S.: Network generations and the security challenge in IoT applications. arXiv preprint arXiv:2201.01927 (2022)

ENISA Report NFV Security in 5G, February 2022

Jiang, W., Han, B., Habibi, M.A., Schotten, H.D.: The road towards 6G: a comprehensive survey. IEEE Open J. Commun. Soc. 2 , 334–366 (2021)

FG-NET, ITUT: Network 2030: A Blueprint of Technology, Applications and Market Drivers Towards the Year 2030 and Beyond, p. 2019. ITU, Geneva (2019)

Chowdhury, M.Z., Shahjalal, M., Ahmed, S., Jang, Y.M.: 6G wireless communication systems: applications, requirements, technologies, challenges, and research directions. IEEE Open J. Commun. Soc. 1 , 957–975 (2020)

Latva-aho M., Leppänen K., Clazzer F., Munari A. Key drivers and research Challenges for 6G Ubiquitous Wireless Intelligence (White Paper). Technical Report. University of Oulu., (2019)

Huang, T., Yang, W., Wu, J., Ma, J., Zhang, X., Zhang, D.: A survey on green 6G network: architecture and technologies. IEEE Access 7 , 175758–175768 (2019)

Nakamura, T.: 5G Evolution and 6G. In: 2020 IEEE Symposium on VLSI Technology, pp. 1–5. IEEE (2020)

Zong, B., Fan, C., Wang, X., Duan, X., Wang, B., Wang, J.: 6G technologies: key drivers, core requirements, system architectures, and enabling technologies. IEEE Veh. Technol. Mag. 14 (3), 18–27 (2019)

Abdel Hakeem, S.A., Hussein, H.H., Kim, H.: Security requirements and challenges of 6G technologies and applications. Sensors 22 (5), 1969 (2022)

Aman, M.N., Javaid, U., Sikdar, B.: Security function virtualization for IoT applications in 6G networks. IEEE Commun. Stand. Mag. 5 (3), 90–95 (2021)

Hakeem, S.A.A., Hussein, H.H., Kim, H.: Vision and research directions of 6G technologies and applications. J. King Saud Univ. Comput. Inf. Sci. 34 (6), 2419-2442 (2022)

Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Niyato, D., et al.: 6G Internet of Things: a comprehensive survey. IEEE Internet Things J. (2021)

Saleem, K., Alabduljabbar, G.M., Alrowais, N., Al-Muhtadi, J., Imran, M., Rodrigues, J.J.: Bio-inspired network security for 5G-enabled IoT applications. IEEE Access 8 , 229152–229160 (2020)

Wazid, M., Das, A.K., Shetty, S., Gope, P., Rodrigues, J.J.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9 , 4466–4489 (2020)

Kumari, A., Gupta, R., Tanwar, S.: Amalgamation of blockchain and IoT for smart cities underlying 6G communication: a comprehensive review. Comput. Commun. 172 , 102–118 (2021)

Higgins J, Green S. Cochrane handbook for systematic reviews of interventions. version 5.1. 0. [updated March 2011]. The Cochrane Collaboration, 2011.

Weidt, F., Silva, R.: Systematic literature review in computer science-a practical guide. Relatórios Técnicos do DCC/UFJF 1 , 1–7 (2016). https://doi.org/10.1027/1016-9040.11.3.244

Ylianttila, M., Kantola, R., Gurtov, A., Mucchi, L., Oppermann, I., Yan, Z., et al.: 6G white paper: research challenges for trust, security and privacy. arXiv preprint arXiv:2004.11665 (2020)

Nguyen, V.L., Lin, P.C., Cheng, B.C., Hwang, R.H., Lin, Y.D.: Security and privacy for 6G: a survey on prospective technologies and challenges. IEEE Commun. Surv. Tutor. 23 (4), 2384–2428 (2021)

Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., Zhou, W.: Security and privacy in 6G networks: new areas and new challenges. Digit. Commun. Netw. 6 (3), 281–291 (2020)

Je, D., Jung, J., Choi, S.: Toward 6G security: technology trends, threats, and solutions. IEEE Commun. Stand. Mag. 5 (3), 64–71 (2021)

https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/

.ENISA (2017). Baseline Security Recommendations for IoT, https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot

NIST, NISTIR 8259 Series, https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program/nistir-8259-series

NIST SP 800-213 series, https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program/sp-800-213-series

Executive Order 14028, Executive Order on Improving the Nation’s Cybersecurity, https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/

NISTIR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, https://csrc.nist.gov/publications/detail/nistir/8259/final

NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline, https://csrc.nist.gov/publications/detail/nistir/8259a/final

NISTIR 8259B, IoT Non-Technical Supporting Capability Core Baseline, https://csrc.nist.gov/publications/detail/nistir/8259b/final

OWASP IoT Security Verification Standard, https://owasp.org/www-project-iot-security-verification-standard/

ISO/IEC 27400:2022 Cybersecurity—IoT security and privacy—Guidelines https://www.iso.org/standard/44373.html

Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10 (3) (2014)

Shaik, A., Borgaonkar, R.: New vulnerabilities in 5G networks. In: Black Hat USA Conference (2019)

Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., Stettler, V.: A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1383–1396 (2018)

Download references

Acknowledgements

This research is funded from the Research Council of Norway through, the SFI Norwegian Centre for Cybersecurity in Critical Sectors (NORCICS) , with the Project Number #310105 in addition to INTPART projects, Reinforcing Competence in Cybersecurity of Critical Infrastructures: A Norway-US Partnership (RECYCIN) , with the Project Number #309911 and International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance) , with the Project Number #337316.

Author information

Sandeep Pirbhulal, Sabarathinam Chockalingam and Ankur Shukla have contributed equally to this work.

Authors and Affiliations

Norwegian Computing Center, Blindern, PO Box 114, 0314, Oslo, Norway

Sandeep Pirbhulal & Habtamu Abie

Department of Risk and Security, Institute for Energy Technology, 1777, Halden, Norway

Sabarathinam Chockalingam & Ankur Shukla

You can also search for this author in PubMed   Google Scholar

Contributions

SP, SC, and AS did initial conceptualisation and data records analysis; SP, and HA prepared the study design and literature review; SP, SC, and AS were involved in writing-original draft preparation; and HA did writing-review and editing. All authors have revised the manuscript together, read and agreed to the published version of the manuscript.

Corresponding authors

Correspondence to Sandeep Pirbhulal , Sabarathinam Chockalingam or Ankur Shukla .

Ethics declarations

Conflict of interest.

The authors declare that they do not have conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Pirbhulal, S., Chockalingam, S., Shukla, A. et al. IoT cybersecurity in 5G and beyond: a systematic literature review. Int. J. Inf. Secur. (2024). https://doi.org/10.1007/s10207-024-00865-5

Download citation

Accepted : 04 May 2024

Published : 28 May 2024

DOI : https://doi.org/10.1007/s10207-024-00865-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cybersecurity
  • 5G and beyond
  • Find a journal
  • Publish with us
  • Track your research

cyber security IEEE PAPERS AND PROJECTS-2020

the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

FREE IEEE PAPER AND PROJECTS

Ieee projects 2022, seminar reports, free ieee projects ieee papers.

  • Skip to content
  • Skip to search
  • Skip to footer

Products, Solutions, and Services

Want some help finding the Cisco products that fit your needs? You're in the right place. If you want troubleshooting help, documentation, other support, or downloads, visit our  technical support area .

Contact Cisco

  • Get a call from Sales

Call Sales:

  • 1-800-553-6387
  • US/CAN | 5am-5pm PT
  • Product / Technical Support
  • Training & Certification

Products by technology

Networking

  • Software-defined networking
  • Cisco Silicon One
  • Cloud and network management
  • Interfaces and modules
  • Optical networking
  • See all Networking

Wireless and Mobility

Wireless and Mobility

  • Access points
  • Outdoor and industrial access points
  • Controllers
  • See all Wireless and Mobility

Security

  • Secure Firewall
  • Secure Endpoint
  • Secure Email
  • Secure Access
  • Multicloud Defense
  • See all Security

Collaboration

Collaboration

  • Collaboration endpoints
  • Conferencing
  • Cisco Contact Center
  • Unified communications
  • Experience Management
  • See all Collaboration

Data Center

Data Center

  • Servers: Cisco Unified Computing System
  • Cloud Networking
  • Hyperconverged infrastructure
  • Storage networking
  • See all Data Center

Analytics

  • Nexus Dashboard Insights
  • Network analytics
  • Cisco Secure Network Analytics (Stealthwatch)

Video

  • Video endpoints
  • Cisco Vision
  • See all Video

Internet of Things

Internet of Things (IoT)

  • Industrial Networking
  • Industrial Routers and Gateways
  • Industrial Security
  • Industrial Switching
  • Industrial Wireless
  • Industrial Connectivity Management
  • Extended Enterprise
  • Data Management
  • See all industrial IoT

Software

  • Cisco+ (as-a-service)
  • Cisco buying programs
  • Cisco Nexus Dashboard
  • Cisco Networking Software
  • Cisco DNA Software for Wireless
  • Cisco DNA Software for Switching
  • Cisco DNA Software for SD-WAN and Routing
  • Cisco Intersight for Compute and Cloud
  • Cisco ONE for Data Center Compute and Cloud
  • See all Software
  • Product index

Products by business type

Service Providers

Service providers

Small Business

Small business

Midsize

Midsize business

Cisco can provide your organization with solutions for everything from networking and data center to collaboration and security. Find the options best suited to your business needs.

  • By technology
  • By industry
  • See all solutions

CX Services

Cisco and our partners can help you transform with less risk and effort while making sure your technology delivers tangible business value.

  • See all services

Design Zone: Cisco design guides by category

Data center

  • See all Cisco design guides

End-of-sale and end-of-life

  • End-of-sale and end-of-life products
  • End-of-Life Policy
  • Cisco Commerce Build & Price
  • Cisco Software Central
  • Cisco Feature Navigator
  • See all product tools
  • Cisco Mobile Apps
  • Design Zone: Cisco design guides
  • Cisco DevNet
  • Marketplace Solutions Catalog
  • Product approvals
  • Product identification standard
  • Product warranties
  • Cisco Security Advisories
  • Security Vulnerability Policy
  • Visio stencils
  • Local Resellers
  • Technical Support

cyber security research paper 2020

IMAGES

  1. Example Of Cyber Security Research Paper

    cyber security research paper 2020

  2. NSA announces winner of 8th Annual Best Scientific Cybersecurity

    cyber security research paper 2020

  3. (PDF) Cyber Security- Research paper

    cyber security research paper 2020

  4. 25+ Trending Cyber Security Research Paper Topics 2020 For Students

    cyber security research paper 2020

  5. Research Paper on Cyber Security

    cyber security research paper 2020

  6. (PDF) Cyber Security Issues and Challenges

    cyber security research paper 2020

VIDEO

  1. Cyber Security Question Paper 2022 |SPPU Question Paper 2022 |March 2022 Question Paper |TYBBA(CA)

  2. Cyber Security Aktu important questions 2024

  3. Cybersecurity Responsibility

  4. cyber security question paper December 2023 #diploma

COMMENTS

  1. Research paper A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

    Security policy components vary according to the policy spectrum (Cheng et al., 2020). The national cyber-security policy, for example, includes all citizens and perhaps foreign businessmen working in its field, but corporate cyber-security only applies to employees who are employed or have a legal contract and are expected to regulate their ...

  2. Journal of Cybersecurity

    Call for Papers. Journal of Cybersecurity is soliciting papers for a special collection on the philosophy of information security. This collection will explore research at the intersection of philosophy, information security, and philosophy of science. Find out more.

  3. Cyber risk and cybersecurity: a systematic review of data ...

    Depending on the amount of data, the extent of the damage caused by a data breach can be significant, with the average cost being USD 392 million Footnote 1 (IBM Security 2020). This research paper reviews the existing literature and open data sources related to cybersecurity and cyber risk, focusing on the datasets used to improve academic ...

  4. Cybersecurity data science: an overview from machine learning

    In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data ...

  5. Articles

    Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology ...

  6. A Systematic Literature Review on Cyber Threat Intelligence for ...

    Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. This research investigates how companies can employ CTI ...

  7. Journal of Cybersecurity and Privacy

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...

  8. PDF Future Series: Cybersecurity, emerging technology and systemic risk

    in the field to discuss and research the issues arising from critical emerging technologies. The programme involved interviews, workshops and research, and this is the final output in the series. This report has been produced in collaboration with the University of Oxford Global Cyber Security Capacity Centre (GCSCC) and its research sponsor AXIS

  9. (PDF) Cyber Security Threats and Vulnerabilities: A ...

    Abstract. There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of ...

  10. Covid-19 Pandemic: A New Era Of Cyber Security Threat And Holistic

    In this paper, we present cyber security threat created worldwide has been discussed during the current COVID-19 situation. To stop the spread of Coronavirus, almost all the countries of the world declared lockdown. People are now doing their office, schooling, and business remotely. For that reason, the use of computers and the internet has increased a lot and made cyber criminals more active ...

  11. Volume 8 Issue 1

    Research Papers. The impact of a cause-effect elaboration procedure on information security risk perceptions: a construal fit perspective. ... Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight. James Pavur and Ivan Martinovic Journal of Cybersecurity, Volume 8, Issue 1, 2022, tyac008, https ...

  12. (PDF) A Systematic Literature Review on the Cyber Security

    A Systematic Literature Review on the Cyber Security. December 2021. International Journal of Scientific Research and Management (IJSRM) Volume 9 (Issue 12):Pages 669 - 710. DOI: 10.18535/ijsrm ...

  13. Cyber security: Threats and Challenges

    Nowadays, computer and network system maintenance is just as important as their protection. Grow into the network systems that are posted on many different websites with payment function and this is seen as websites needed sensitive information and are important to any organization. Viruses represent one of the most successful ways to attack these systems and their use is inevitably part of ...

  14. Volume 9 Issue 1

    A fully open access journal, publishing accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security.

  15. 2020 Cybersecurity and Privacy Annual Report

    During Fiscal Year 2020 (FY 2020), from October 1, 2019 through September 30, 2020, the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy P

  16. The 2020 Cyber Security Report

    In this 2020 Cyber Security Annual Report, we provide you with a timeline of 2019's significant cyber events, including their relevant facts and insights. By analyzing our telemetric, product and vulnerability research, and our own ThreatCloud threat intelligence, we offer a detailed analysis of the cyber trends. you need to consider.

  17. Full article: Cybersecurity Deep: Approaches, Attacks Dataset, and

    The remaining paper is structured as follows. ... The research should highlight building a real-time setup to validate deep learning approaches so they can counter new types of cybersecurity attacks. ... and H. Janicke. 2020. Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. Journal of ...

  18. Analysis of Cybersecurity Awareness Among Young Generation: A Research

    The enormous growth in technology has made humans more dependent on the online world, but unfortunately, that leads to cyber-attacks. This paper deeply tells various forms of cyber threats that affect society, including loss of sensitive data, ransomware attacks, phishing attacks, man-in-the-middle attacks, and distributed denial of service attacks. This study explores cybersecurity measures ...

  19. IoT cybersecurity in 5G and beyond: a systematic literature ...

    The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as transportation, healthcare, and energy. There are several advantages of 5G and beyond for IoT applications like high speed and low latency. However, they are prone to cybersecurity threats due to networks softwarization and virtualization, thus raising ...

  20. cyber security IEEE PAPERS AND PROJECTS-2020

    cyber security IEEE PAPERS AND PROJECTS-2020. the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. Social cybersecurity is an emerging subdomain of national security that will affect all levels of ...

  21. Research Paper On Cyber Security 2020

    Research Paper on Cyber Security 2020 - Free download as PDF File (.pdf), Text File (.txt) or read online for free. This document summarizes several major cybersecurity threats in 2020, including ransomware, cloud vulnerabilities, artificial intelligence risks, data theft, IoT risks, malware updates, and risks to new companies. It recommends collaborating with an IT security partner ...

  22. Products, Solutions, and Services

    Cisco+ (as-a-service) Cisco buying programs. Cisco Nexus Dashboard. Cisco Networking Software. Cisco DNA Software for Wireless. Cisco DNA Software for Switching. Cisco DNA Software for SD-WAN and Routing. Cisco Intersight for Compute and Cloud. Cisco ONE for Data Center Compute and Cloud.