{"id":"https://openalex.org/W4416874581","doi":"https://doi.org/10.1109/ispa66905.2025.11259488","title":"Enhancing Cybersecurity and Green Communication in 5G Networks: Challenges and Sustainable Solutions","display_name":"Enhancing Cybersecurity and Green Communication in 5G Networks: Challenges and Sustainable Solutions","publication_year":2025,"publication_date":"2025-10-29","ids":{"openalex":"https://openalex.org/W4416874581","doi":"https://doi.org/10.1109/ispa66905.2025.11259488"},"language":null,"primary_location":{"id":"doi:10.1109/ispa66905.2025.11259488","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa66905.2025.11259488","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120410202","display_name":"Ibrahim Ali Kh Shati","orcid":null},"institutions":[{"id":"https://openalex.org/I933318745","display_name":"Dehradun Institute of Technology University","ror":"https://ror.org/01v5k4d73","country_code":"IN","type":"education","lineage":["https://openalex.org/I933318745"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ibrahim Ali Kh Shati","raw_affiliation_strings":["Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya"],"affiliations":[{"raw_affiliation_string":"Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya","institution_ids":["https://openalex.org/I933318745"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120532012","display_name":"Mohamed Farid Soliman Gernaz","orcid":null},"institutions":[{"id":"https://openalex.org/I933318745","display_name":"Dehradun Institute of Technology University","ror":"https://ror.org/01v5k4d73","country_code":"IN","type":"education","lineage":["https://openalex.org/I933318745"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohamed Farid Soliman Gernaz","raw_affiliation_strings":["Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya"],"affiliations":[{"raw_affiliation_string":"Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya","institution_ids":["https://openalex.org/I933318745"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Abdulati Ibrahim Omar Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I2799478056","display_name":"Zaytuna College","ror":"https://ror.org/03re0h651","country_code":"US","type":"education","lineage":["https://openalex.org/I2799478056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdulati Ibrahim Omar Abdullah","raw_affiliation_strings":["Azzaytuna University,Department of Electrical and Electronic Engineering,Tarhuna,Libya"],"affiliations":[{"raw_affiliation_string":"Azzaytuna University,Department of Electrical and Electronic Engineering,Tarhuna,Libya","institution_ids":["https://openalex.org/I2799478056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120575556","display_name":"Ahmed Salah Aldeen Sahab","orcid":null},"institutions":[{"id":"https://openalex.org/I933318745","display_name":"Dehradun Institute of Technology University","ror":"https://ror.org/01v5k4d73","country_code":"IN","type":"education","lineage":["https://openalex.org/I933318745"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ahmed Salah Aldeen Sahab","raw_affiliation_strings":["Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya"],"affiliations":[{"raw_affiliation_string":"Nalut University,Department of Electrical and Electronic Engineering,Jadu,Libya","institution_ids":["https://openalex.org/I933318745"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5120410202"],"corresponding_institution_ids":["https://openalex.org/I933318745"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35699343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"181","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.5371999740600586,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.5371999740600586,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.09740000218153,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.06679999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5748999714851379},{"id":"https://openalex.org/keywords/sustainability","display_name":"Sustainability","score":0.5386999845504761},{"id":"https://openalex.org/keywords/transformative-learning","display_name":"Transformative learning","score":0.4839000105857849},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4837999939918518},{"id":"https://openalex.org/keywords/broadband","display_name":"Broadband","score":0.47839999198913574},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.40610000491142273},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.40369999408721924},{"id":"https://openalex.org/keywords/green-computing","display_name":"Green computing","score":0.385699987411499},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.35269999504089355}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6100000143051147},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5855000019073486},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5748999714851379},{"id":"https://openalex.org/C66204764","wikidata":"https://www.wikidata.org/wiki/Q219416","display_name":"Sustainability","level":2,"score":0.5386999845504761},{"id":"https://openalex.org/C70587473","wikidata":"https://www.wikidata.org/wiki/Q7834111","display_name":"Transformative learning","level":2,"score":0.4839000105857849},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4837999939918518},{"id":"https://openalex.org/C509933004","wikidata":"https://www.wikidata.org/wiki/Q194163","display_name":"Broadband","level":2,"score":0.47839999198913574},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.40610000491142273},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.40369999408721924},{"id":"https://openalex.org/C75027835","wikidata":"https://www.wikidata.org/wiki/Q1064746","display_name":"Green computing","level":3,"score":0.385699987411499},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3855000138282776},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.35269999504089355},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3319000005722046},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.31709998846054077},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.3147999942302704},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3102000057697296},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C552854447","wikidata":"https://www.wikidata.org/wiki/Q131201","display_name":"Sustainable development","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C2982926626","wikidata":"https://www.wikidata.org/wiki/Q1962383","display_name":"Sustainable energy","level":3,"score":0.2879999876022339},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C78834623","wikidata":"https://www.wikidata.org/wiki/Q640394","display_name":"Mobile broadband","level":3,"score":0.26350000500679016},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.25270000100135803},{"id":"https://openalex.org/C125599584","wikidata":"https://www.wikidata.org/wiki/Q15057100","display_name":"Broadband networks","level":3,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispa66905.2025.11259488","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa66905.2025.11259488","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2789828921","https://openalex.org/W3212755558","https://openalex.org/W4389343771","https://openalex.org/W4397034672"],"related_works":[],"abstract_inverted_index":{"5G":[0,80],"networks":[1],"represent":[2],"a":[3],"transformative":[4],"advancement":[5],"in":[6],"telecommunications,":[7],"offering":[8],"ultra-reliable":[9],"low-latency":[10],"communication":[11,20],"(URLLC),":[12],"enhanced":[13],"mobile":[14],"broadband":[15],"(eMBB),":[16],"and":[17,28,39,48,61,76,87,107,112],"massive":[18],"machine-type":[19],"(mMTC).":[21],"However,":[22],"these":[23,46],"advancements":[24],"introduce":[25],"significant":[26],"cybersecurity":[27],"sustainability":[29,111],"challenges":[30,47],"due":[31],"to":[32,95],"expanded":[33],"attack":[34],"surfaces,":[35],"new":[36],"threat":[37],"vectors,":[38],"rising":[40],"energy":[41,85],"demands.":[42],"This":[43],"paper":[44,68],"examines":[45],"proposes":[49],"solutions,":[50],"including":[51],"advanced":[52],"encryption":[53],"mechanisms,":[54],"AI-driven":[55],"intrusion":[56,88],"detection":[57,89],"systems,":[58],"blockchain-based":[59],"authentication,":[60],"zero-trust":[62],"frameworks.":[63],"To":[64],"strengthen":[65],"validity,":[66],"the":[67,92],"references":[69],"benchmark":[70],"datasets":[71],"(e.g.,":[72],"CICIDS":[73],"2017,":[74],"UNSWNB15)":[75],"empirical":[77],"studies":[78],"from":[79],"testbeds":[81],"that":[82],"demonstrate":[83],"quantifiable":[84],"savings":[86],"accuracy.":[90],"Additionally,":[91],"discussion":[93],"extends":[94],"6G":[96],"innovations":[97],"such":[98],"as":[99,114],"native":[100],"AI":[101],"integration,":[102],"Reconfigurable":[103],"Intelligent":[104],"Surfaces":[105],"(RIS),":[106],"semantic":[108],"communications,":[109],"positioning":[110],"security":[113],"core":[115],"design":[116],"principles.":[117]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-12-01T00:00:00"}
