{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:01:22Z","timestamp":1732039282733},"reference-count":77,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1016\/j.comnet.2020.107345","type":"journal-article","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T06:09:51Z","timestamp":1591078191000},"page":"107345","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":103,"special_numbering":"C","title":["5G In the internet of things era: An overview on security and privacy challenges"],"prefix":"10.1016","volume":"179","author":[{"given":"Sabrina","family":"Sicari","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Rizzardi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Coen-Porisini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.comnet.2020.107345_bib0001","first-page":"47","article-title":"Evolution of mobile wireless communication networks-1g to 5g as well as future prospective of next generation communication network","volume":"2","author":"Sharma","year":"2013","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"10.1016\/j.comnet.2020.107345_bib0002","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","article-title":"A survey of 5G network: architecture and emerging technologies","volume":"3","author":"Gupta","year":"2015","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2020.107345_bib0003","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.is.2016.02.003","article-title":"A secure and quality-aware prototypical architecture for the internet of things","volume":"58","author":"Sicari","year":"2016","journal-title":"Inf. Syst."},{"key":"10.1016\/j.comnet.2020.107345_bib0004","series-title":"Proceedings of the first edition of the MCC workshop on Mobile cloud computing","first-page":"13","article-title":"Fog computing and its role in the internet of things","author":"Bonomi","year":"2012"},{"key":"10.1016\/j.comnet.2020.107345_bib0005","series-title":"IEEE Trustcom\/BigDataSE\/ISPA","first-page":"1165","article-title":"Towards 5G security","volume":"1","author":"Schneider","year":"2015"},{"issue":"1","key":"10.1016\/j.comnet.2020.107345_bib0006","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","article-title":"A comprehensive survey on fog computing: state-of-the-art and research challenges","volume":"20","author":"Mouradian","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2020.107345_bib0007","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Generat. Comput. Syst."},{"issue":"5","key":"10.1016\/j.comnet.2020.107345_bib0008","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","article-title":"Network slicing in 5G: survey and challenges","volume":"55","author":"Foukas","year":"2017","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0009","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","article-title":"Next generation 5G wireless networks: a comprehensive survey","volume":"18","author":"Agiwal","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2020.107345_bib0010","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","article-title":"A survey on 5G: the next generation of mobile communication","volume":"18","author":"Panwar","year":"2016","journal-title":"Phys. Commun."},{"issue":"4","key":"10.1016\/j.comnet.2020.107345_bib0011","doi-asserted-by":"crossref","first-page":"3098","DOI":"10.1109\/COMST.2018.2841349","article-title":"A survey on low latency towards 5G: ran, core network and caching solutions","volume":"20","author":"Parvez","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"10.1016\/j.comnet.2020.107345_bib0012","doi-asserted-by":"crossref","first-page":"2657","DOI":"10.1007\/s11276-015-0942-z","article-title":"A survey of millimeter wave communications (mmwave) for 5G: opportunities and challenges","volume":"21","author":"Niu","year":"2015","journal-title":"Wirel. Netw."},{"issue":"10","key":"10.1016\/j.comnet.2020.107345_bib0013","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/JSAC.2017.2725519","article-title":"A survey on non-orthogonal multiple access for 5Gnetworks: research challenges and future trends","volume":"35","author":"Ding","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0014","doi-asserted-by":"crossref","first-page":"2294","DOI":"10.1109\/COMST.2018.2835558","article-title":"A survey of non-orthogonal multiple access for 5G","volume":"20","author":"Dai","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2020.107345_bib0015","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/ACCESS.2016.2556011","article-title":"5G backhaul challenges and emerging research directions: a survey","volume":"4","author":"Jaber","year":"2016","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0016","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1109\/COMST.2017.2705720","article-title":"On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration","volume":"19","author":"Taleb","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.comnet.2020.107345_bib0017","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/COMST.2016.2516538","article-title":"User association in 5G networks: a survey and an outlook","volume":"18","author":"Liu","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.comnet.2020.107345_bib0018","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/JSAC.2016.2550338","article-title":"A survey of energy-efficient techniques for 5Gnetworks and challenges ahead","volume":"34","author":"Buzzi","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"10.1016\/j.comnet.2020.107345_bib0019","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.icte.2017.03.005","article-title":"Cooperative localization in 5G networks: a survey","volume":"3","author":"Zhang","year":"2017","journal-title":"ICT Express"},{"key":"10.1016\/j.comnet.2020.107345_bib0020","first-page":"1","article-title":"5G internet of things: a survey","volume":"10","author":"Li","year":"2018","journal-title":"J. Indus. Inf. Integrat."},{"key":"10.1016\/j.comnet.2020.107345_bib0021","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","article-title":"A survey on 5G networks for the internet of things: communication technologies and challenges","volume":"6","author":"Akpakwu","year":"2017","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.comnet.2020.107345_bib0022","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A survey of physical layer security techniques for 5Gwireless networks and challenges ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2020.107345_bib0023","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","article-title":"Security for 4g and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes","volume":"101","author":"Ferrag","year":"2018","journal-title":"J. Netw. Computer. Appl."},{"key":"10.1016\/j.comnet.2020.107345_bib0024","doi-asserted-by":"crossref","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","article-title":"A review on the use of blockchain for the internet of things","volume":"6","author":"Fern\u00e1ndez-Caram\u00e9s","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2020.107345_bib0025","article-title":"Security, privacy and trust of different layers in internet-of-things (IoTs) framework","author":"Tewari","year":"2018","journal-title":"Future Generat. Comput. Syst."},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0026","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","article-title":"Security in internet of things: issues, challenges, taxonomy, and architecture","volume":"67","author":"Adat","year":"2018","journal-title":"Telecommun. Syst."},{"key":"10.1016\/j.comnet.2020.107345_bib0027","first-page":"e4946","article-title":"An overview of internet of things (IoT): architectural aspects, challenges, and protocols","author":"Gupta","year":"2018","journal-title":"Concurren. Comput."},{"issue":"5","key":"10.1016\/j.comnet.2020.107345_bib0028","first-page":"357","article-title":"Quantum-elliptic curve cryptography for multihop communication in 5G networks","volume":"17","author":"Khan","year":"2017","journal-title":"Int. J. Comput. Sci. Netw. Securi. (IJCSNS)"},{"key":"10.1016\/j.comnet.2020.107345_bib0029","series-title":"International Wireless Communications and Mobile Computing Conference (IWCMC)","first-page":"616","article-title":"Fast group discovery and non-repudiation in d2d communications using ibe","author":"Abd-Elrahman","year":"2015"},{"key":"10.1016\/j.comnet.2020.107345_bib0030","series-title":"IFIP Networking Conference (IFIP Networking) and Workshops","first-page":"1","article-title":"Semud: Secure multi-hop device-to-device communication for 5G public safety networks","author":"Schmittner","year":"2017"},{"issue":"2","key":"10.1016\/j.comnet.2020.107345_bib0031","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOM.2018.1700625","article-title":"Integration of lorawan and 4g\/5G for the industrial internet of things","volume":"56","author":"Navarro-Ortiz","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2020.107345_bib0032","doi-asserted-by":"crossref","first-page":"7854","DOI":"10.1109\/ACCESS.2018.2797102","article-title":"Mutual heterogeneous signcryption schemes for 5Gnetwork slicings","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2020.107345_bib0033","series-title":"Guide to Security in SDN and NFV","first-page":"253","article-title":"Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G","author":"Santos","year":"2017"},{"key":"10.1016\/j.comnet.2020.107345_bib0034","series-title":"IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Cross-layer authentication protocol design for ultra-dense 5G hetnets","author":"Moreira","year":"2018"},{"key":"10.1016\/j.comnet.2020.107345_bib0035","doi-asserted-by":"crossref","first-page":"4018","DOI":"10.1109\/ACCESS.2017.2678510","article-title":"Lacs: a lightweight label-based access control scheme in IoT-based 5G caching context","volume":"5","author":"Wang","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0036","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/JSAC.2018.2815418","article-title":"Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT","volume":"36","author":"Ni","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2020.107345_bib0037","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.11.009","article-title":"Eghr: efficient group-based handover authentication protocols for mmtc in 5G wireless networks","volume":"102","author":"Cao","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2020.107345_bib0038","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2019.2927664","article-title":"Robust and universal seamless handover authentication in 5G hetnets","author":"Zhang","year":"2019","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.comnet.2020.107345_bib0039","doi-asserted-by":"crossref","first-page":"55372","DOI":"10.1109\/ACCESS.2018.2871642","article-title":"A security authentication scheme of 5G ultra-dense network based on block chain","volume":"6","author":"Chen","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2020.107345_bib0040","series-title":"22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","first-page":"201","article-title":"Baladin for blockchain-based 5G networks","author":"Messi\u00e9","year":"2019"},{"key":"10.1016\/j.comnet.2020.107345_bib0041","doi-asserted-by":"crossref","first-page":"20795","DOI":"10.1109\/ACCESS.2018.2826518","article-title":"Mitigating dos attacks against pseudonymous authentication through puzzle-based co-authentication in 5G-vanet","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2020.107345_bib0042","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1016\/j.future.2017.08.052","article-title":"Flexible data access control in d2d communications","volume":"82","author":"Yan","year":"2018","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.comnet.2020.107345_bib0043","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2019.2895136","article-title":"Rsma: reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks","author":"Cui","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2020.107345_bib0044","series-title":"Workshop on the Theory and Application ofCryptographic Techniques","first-page":"257","article-title":"Group signatures","author":"Chaum","year":"1991"},{"key":"10.1016\/j.comnet.2020.107345_bib0045","series-title":"2017 IEEE international conference on communications workshops (ICC workshops)","first-page":"259","article-title":"A secure icn-IoT architecture","author":"Sicari","year":"2017"},{"key":"10.1016\/j.comnet.2020.107345_bib0046","series-title":"2016 Wireless Days (WD)","first-page":"1","article-title":"Key exchange protocols for secure device-to-device (d2d) communication in 5G","author":"Sedidi","year":"2016"},{"issue":"4","key":"10.1016\/j.comnet.2020.107345_bib0047","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G wireless communication networks using physical layer security","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2020.107345_bib0048","doi-asserted-by":"crossref","DOI":"10.13052\/jicts2245-800X.514","article-title":"Privacy enhanced fast mutual authentication in 5Gnetwork using identity based encryption","author":"Khan","year":"2017","journal-title":"J. ICT Standardizat."},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0049","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","article-title":"A secure and scalable group key exchange system","volume":"94","author":"Burmester","year":"2005","journal-title":"Inf. Process. Lett."},{"issue":"10","key":"10.1016\/j.comnet.2020.107345_bib0050","doi-asserted-by":"crossref","first-page":"7868","DOI":"10.1109\/TVT.2016.2541862","article-title":"Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks","volume":"65","author":"Eiza","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2020.107345_bib0051","series-title":"Iranian Conference on Electrical Engineering (ICEE)","first-page":"2159","article-title":"Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5G vehicular networks","author":"Mohseni-Ejiyeh","year":"2017"},{"key":"10.1016\/j.comnet.2020.107345_bib0052","series-title":"IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)","first-page":"63","article-title":"Towards location and trajectory privacy preservation in 5G vehicular social network","volume":"2","author":"Liao","year":"2017"},{"issue":"5","key":"10.1016\/j.comnet.2020.107345_bib0053","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1049\/iet-com.2017.0619","article-title":"Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G","volume":"12","author":"Fan","year":"2017","journal-title":"IET Commun."},{"issue":"2","key":"10.1016\/j.comnet.2020.107345_bib0054","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/MVT.2018.2813422","article-title":"Trusted 5G vehicular networks: blockchains and content-centric networking","volume":"13","author":"Ortega","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"10.1016\/j.comnet.2020.107345_bib0055","series-title":"IEEE 81st Vehicular Technology Conference (VTC Spring)","first-page":"1","article-title":"5G visions of user privacy","author":"Sorensen","year":"2015"},{"key":"10.1016\/j.comnet.2020.107345_bib0056","series-title":"IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","first-page":"2082","article-title":"Towards a standardized identity federation for internet of things in 5G networks","author":"Santos","year":"2018"},{"key":"10.1016\/j.comnet.2020.107345_bib0057","series-title":"IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"Privacy-preserving data preprocessing for fog computing in 5G network security","author":"Xu","year":"2018"},{"key":"10.1016\/j.comnet.2020.107345_bib0058","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1002\/9781119293071.ch12","article-title":"User privacy, identity and trust in 5G","author":"Kumar","year":"2018","journal-title":"Comprehens. Guide 5G Secur."},{"issue":"16","key":"10.1016\/j.comnet.2020.107345_bib0059","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","article-title":"A security and trust framework for virtualized networks and software-defined networking","volume":"9","author":"Yan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.comnet.2020.107345_bib0060","series-title":"3rd IEEE International Conference on Computer and Communications (ICCC)","first-page":"1150","article-title":"5g network slice security trust degree calculation model","author":"Niu","year":"2017"},{"issue":"16","key":"10.1016\/j.comnet.2020.107345_bib0061","doi-asserted-by":"crossref","first-page":"3070","DOI":"10.1002\/sec.1253","article-title":"Policy-based communications for 5G mobile with customer edge switching","volume":"9","author":"Kantola","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"10.1016\/j.comnet.2020.107345_bib0062","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1007\/s12652-018-0813-4","article-title":"Dynamic management of a deep learning-based anomaly detection system for 5G networks","volume":"10","author":"Maim\u00f3","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"4","key":"10.1016\/j.comnet.2020.107345_bib0063","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2016.7452271","article-title":"Network function virtualization in 5G","volume":"54","author":"Abdelwahab","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2020.107345_bib0064","series-title":"IEEE Wireless Communications and Networking Conference","first-page":"1","article-title":"Service-oriented resource virtualization for evolving tdd networks towards 5G","author":"Costanzo","year":"2016"},{"key":"10.1016\/j.comnet.2020.107345_bib0065","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.aeue.2017.01.025","article-title":"Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network","volume":"74","author":"Devi","year":"2017","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"10.1016\/j.comnet.2020.107345_bib0066","series-title":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","first-page":"1","article-title":"An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks","author":"Rezvy","year":"2019"},{"issue":"10","key":"10.1016\/j.comnet.2020.107345_bib0067","doi-asserted-by":"crossref","first-page":"e3237","DOI":"10.1002\/dac.3237","article-title":"Attack modeling and intrusion detection system for 5Gwireless communication network","volume":"30","author":"Gupta","year":"2017","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"10.1016\/j.comnet.2020.107345_bib0068","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1109\/TVT.2017.2745110","article-title":"Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network","volume":"67","author":"Gupta","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0069","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11277-010-0069-6","article-title":"Location-aware mobile intrusion detection with enhanced privacy in a 5G context","volume":"57","author":"Ulltveit-Moe","year":"2011","journal-title":"Wirel. Pers. Commun."},{"issue":"16","key":"10.1016\/j.comnet.2020.107345_bib0070","doi-asserted-by":"crossref","first-page":"3049","DOI":"10.1002\/sec.1224","article-title":"Intrusion detection techniques for mobile cloud computing in heterogeneous 5G","volume":"9","author":"Gai","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.comnet.2020.107345_bib0071","first-page":"1","article-title":"Iot transaction processing through cooperative concurrency control on fog-cloud computing environment","author":"Al-Qerem","year":"2019","journal-title":"Soft. Comput."},{"issue":"8","key":"10.1016\/j.comnet.2020.107345_bib0072","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600940","article-title":"Network slicing based 5G and future mobile networks: mobility, resource management, and challenges","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2020.107345_bib0073","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"Iot security: review, blockchain solutions, and open challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Fut. Generat. Comput. Syst."},{"issue":"9","key":"10.1016\/j.comnet.2020.107345_bib0074","first-page":"60","article-title":"Sticky policies: an approach for managing privacy across multiple parties","volume":"44","author":"Pearson","year":"2011","journal-title":"Computer (Long Beach Calif)"},{"issue":"3","key":"10.1016\/j.comnet.2020.107345_bib0075","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","article-title":"Internet of things in the 5G era: enablers, architecture, and business models","volume":"34","author":"Palattella","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2020.107345_bib0076","doi-asserted-by":"crossref","first-page":"7958","DOI":"10.1109\/ACCESS.2018.2799603","article-title":"Self-adaptive scheduling of base transceiver stations in green 5G networks","volume":"6","author":"Dutta","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.comnet.2020.107345_bib0077","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.dcan.2017.09.010","article-title":"A survey of 5G technologies: regulatory, standardization and industrial perspectives","volume":"4","author":"Morgado","year":"2018","journal-title":"Digit. Commun. Netw."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128620300827?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128620300827?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T04:54:40Z","timestamp":1607748880000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128620300827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":77,"alternative-id":["S1389128620300827"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2020.107345","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"5G In the internet of things era: An overview on security and privacy challenges","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2020.107345","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107345"}}