Research Article
Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation
Table 1
Comparative description of the 5G network service attack.
| S. no. | Study | Security issue | Description of the attack |
| 1. | Hu et al. (2021) | Denial-of-service (DoS) attacks | The 5G network service and resources will be unavailable for dedicated users due to disruption of services | 2. | Alshouiliy et al. (2021) | Spoofing attacks | Programs are used to classify altering data to receive unfair advantages | 3. | Ahmad et al. (2018) | Denial-of-service (DoS) attacks | The 5G network service and resources will be unavailable for dedicated users due to disruption of services | 4. | Shaik et al. (2019) | Man-in-the-middle (MitM) attacks | Many resources are used to leak the information between 5G network protocols, servers, or clients | 5. | Fang (2021) | Side-channel attack | Important information received from the implementation of 5G technology system |
|
|