Research Article

Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

Table 1

Comparative description of the 5G network service attack.

S. no.StudySecurity issueDescription of the attack

1.Hu et al. (2021)Denial-of-service (DoS) attacksThe 5G network service and resources will be unavailable for dedicated users due to disruption of services
2.Alshouiliy et al. (2021)Spoofing attacksPrograms are used to classify altering data to receive unfair advantages
3.Ahmad et al. (2018)Denial-of-service (DoS) attacksThe 5G network service and resources will be unavailable for dedicated users due to disruption of services
4.Shaik et al. (2019)Man-in-the-middle (MitM) attacksMany resources are used to leak the information between 5G network protocols, servers, or clients
5.Fang (2021)Side-channel attackImportant information received from the implementation of 5G technology system