3 research outputs found

    Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review

    Get PDF
    There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G application

    Conceptual Review of DoS Attacks in Software Defined Networks

    No full text
    Software-defined networking (SDN) is a new developing technology that has been widely adopted by businesses because of its low cost and greater innovation in networks specially Scaling or manually configuring physical infrastructure. This makes it easier to design networks and manage huge networks. Scaling or manually configuring physical infrastructure is a problem for older networks, which cannot keep up with today's rapid technological advancements. Another important issue is the lack of information and the absence of a skill set or experienced experts required with technological expertise, which is very much concerned about the current situation. For this reason, a software-defined network architecture has been developed that allows for a more flexible network that can be reconfigured to meet changing needs. However, there are also other security concerns to consider especially the controller’s security. In this paper, we examine the impact of Denial of Service (DoS) attacks on the SDN controller and different mitigation techniques to overcome these attacks. The research effort also points out possible future research on this topic, as well as its limitations

    Blockchain-based multifactor authentication for future 6G cellular networks: a systematic review.

    Get PDF
    There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G applications
    corecore