3 research outputs found
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a
continued evolution of the mobile network. Blockchain technology is one of the leading supporting
technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions,
and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based
systems, and aim to be the foundation for the Internet of Everything. However, along with the
development of communication technologies, threats from malicious parties have become more
sophisticated, making security a significant concern for the 6G era in the future. Despite enormous
efforts by researchers to improve security and authentication protocols, systems still face novel
intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed
as potential solutions to attacks in blockchains. The 6G applications and the cellular network have
specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The
current paper is a systematic review that discusses the three technologies under consideration; then,
several studies are reviewed that discuss MFA techniques in general and use blockchains as potential
solutions to future security and authentication issues that may arise for 6G application
Conceptual Review of DoS Attacks in Software Defined Networks
Software-defined networking (SDN) is a new developing technology that has been widely adopted by businesses because of its low cost and greater innovation in
networks specially Scaling or manually configuring
physical infrastructure. This makes it easier to design
networks and manage huge networks. Scaling or manually
configuring physical infrastructure is a problem for older
networks, which cannot keep up with today's rapid
technological advancements. Another important issue is the
lack of information and the absence of a skill set or
experienced experts required with technological expertise,
which is very much concerned about the current situation.
For this reason, a software-defined network architecture
has been developed that allows for a more flexible network
that can be reconfigured to meet changing needs. However,
there are also other security concerns to consider especially the controller’s security. In this paper, we examine the impact of Denial of Service (DoS) attacks on the SDN controller and different mitigation techniques to overcome these attacks. The research effort also points out possible future research on this topic, as well as its limitations
Blockchain-based multifactor authentication for future 6G cellular networks: a systematic review.
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G applications