Security Challenges and Countermeasures in Next-Generation Wireless Networks Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.52088/ijesty.v5i2.1492
The prospects of new-age wireless networks, such as 5G and 6G technologies, include unrivalled speed, connectivity, and integration of multifarious devices. However, their sophisticated architecture— which encompasses network slicing, edge computing, massive IoT, and software-defined networking—creates even greater challenges in network security. These vulnerabilities could be exploited to launch advanced attacks such as Distributed Denial of Service (DDoS) attacks, eavesdropping, spoofing, or data manipulation. This study aims to explore the evolving threat landscape for next-generation wireless networks while reviewing both existing and emerging strategic solutions. Some of the counter-surveillance technologies incorporated include AI-based Intrusion Detection Systems, Trust Frameworks on Blockchain, strong cryptography, and credential-less authentication. Addressing the challenge of dynamic threat capabilities paired with innovative defences allows this research to propose concepts for the next resilient and secure wireless communication systems.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.52088/ijesty.v5i2.1492
- https://ijesty.org/index.php/ijesty/article/download/1492/629
- OA Status
- diamond
- OpenAlex ID
- https://openalex.org/W4414652255
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4414652255Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.52088/ijesty.v5i2.1492Digital Object Identifier
- Title
-
Security Challenges and Countermeasures in Next-Generation Wireless NetworksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-05-22Full publication date if available
- Authors
-
H. R. Manjunath, Aditya Yadav, Sumeet Singh Sarpal, N. Mounika, Shashikant Patil, N.M. Nandhitha, Santosh Ku. BeheraList of authors in order
- Landing page
-
https://doi.org/10.52088/ijesty.v5i2.1492Publisher landing page
- PDF URL
-
https://ijesty.org/index.php/ijesty/article/download/1492/629Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://ijesty.org/index.php/ijesty/article/download/1492/629Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4414652255 |
|---|---|
| doi | https://doi.org/10.52088/ijesty.v5i2.1492 |
| ids.doi | https://doi.org/10.52088/ijesty.v5i2.1492 |
| ids.openalex | https://openalex.org/W4414652255 |
| fwci | 0.0 |
| type | article |
| title | Security Challenges and Countermeasures in Next-Generation Wireless Networks |
| biblio.issue | 2 |
| biblio.volume | 5 |
| biblio.last_page | 552 |
| biblio.first_page | 548 |
| topics[0].id | https://openalex.org/T10651 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9253000020980835 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | IPv6, Mobility, Handover, Networks, Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | doi:10.52088/ijesty.v5i2.1492 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210197357 |
| locations[0].source.issn | 2775-2674 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2775-2674 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Engineering Science and Information Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ijesty.org/index.php/ijesty/article/download/1492/629 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Engineering, Science and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.52088/ijesty.v5i2.1492 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5113549041 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | H. R. Manjunath |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Honganur Raju Manjunath |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5110813375 |
| authorships[1].author.orcid | https://orcid.org/0009-0004-9723-7473 |
| authorships[1].author.display_name | Aditya Yadav |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Aditya Yadav |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5084460010 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Sumeet Singh Sarpal |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Sumeet Singh Sarpal |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5108280382 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | N. Mounika |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Nagireddy Mounika |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5037371035 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-8835-908X |
| authorships[4].author.display_name | Shashikant Patil |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Shashikant Patil |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5023973218 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | N.M. Nandhitha |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | N.M. Nandhitha |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5032295283 |
| authorships[6].author.orcid | |
| authorships[6].author.display_name | Santosh Ku. Behera |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Santosh Ku. Behera |
| authorships[6].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ijesty.org/index.php/ijesty/article/download/1492/629 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Security Challenges and Countermeasures in Next-Generation Wireless Networks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10651 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9253000020980835 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | IPv6, Mobility, Handover, Networks, Security |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.52088/ijesty.v5i2.1492 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210197357 |
| best_oa_location.source.issn | 2775-2674 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2775-2674 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Engineering Science and Information Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ijesty.org/index.php/ijesty/article/download/1492/629 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Engineering, Science and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.52088/ijesty.v5i2.1492 |
| primary_location.id | doi:10.52088/ijesty.v5i2.1492 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210197357 |
| primary_location.source.issn | 2775-2674 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2775-2674 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Engineering Science and Information Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ijesty.org/index.php/ijesty/article/download/1492/629 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Engineering, Science and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.52088/ijesty.v5i2.1492 |
| publication_date | 2025-05-22 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.5G | 8 |
| abstract_inverted_index.6G | 10 |
| abstract_inverted_index.as | 7, 52 |
| abstract_inverted_index.be | 45 |
| abstract_inverted_index.in | 39 |
| abstract_inverted_index.of | 2, 18, 55, 86, 108 |
| abstract_inverted_index.on | 98 |
| abstract_inverted_index.or | 61 |
| abstract_inverted_index.to | 47, 67, 119 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 9, 16, 33, 81, 102, 126 |
| abstract_inverted_index.for | 73, 122 |
| abstract_inverted_index.the | 69, 87, 106, 123 |
| abstract_inverted_index.IoT, | 32 |
| abstract_inverted_index.Some | 85 |
| abstract_inverted_index.This | 64 |
| abstract_inverted_index.aims | 66 |
| abstract_inverted_index.both | 79 |
| abstract_inverted_index.data | 62 |
| abstract_inverted_index.edge | 29 |
| abstract_inverted_index.even | 36 |
| abstract_inverted_index.next | 124 |
| abstract_inverted_index.such | 6, 51 |
| abstract_inverted_index.this | 117 |
| abstract_inverted_index.with | 113 |
| abstract_inverted_index.These | 42 |
| abstract_inverted_index.Trust | 96 |
| abstract_inverted_index.could | 44 |
| abstract_inverted_index.study | 65 |
| abstract_inverted_index.their | 22 |
| abstract_inverted_index.which | 25 |
| abstract_inverted_index.while | 77 |
| abstract_inverted_index.(DDoS) | 57 |
| abstract_inverted_index.Denial | 54 |
| abstract_inverted_index.allows | 116 |
| abstract_inverted_index.launch | 48 |
| abstract_inverted_index.paired | 112 |
| abstract_inverted_index.secure | 127 |
| abstract_inverted_index.speed, | 14 |
| abstract_inverted_index.strong | 100 |
| abstract_inverted_index.threat | 71, 110 |
| abstract_inverted_index.Service | 56 |
| abstract_inverted_index.attacks | 50 |
| abstract_inverted_index.dynamic | 109 |
| abstract_inverted_index.explore | 68 |
| abstract_inverted_index.greater | 37 |
| abstract_inverted_index.include | 12, 91 |
| abstract_inverted_index.massive | 31 |
| abstract_inverted_index.network | 27, 40 |
| abstract_inverted_index.new-age | 3 |
| abstract_inverted_index.propose | 120 |
| abstract_inverted_index.AI-based | 92 |
| abstract_inverted_index.However, | 21 |
| abstract_inverted_index.Systems, | 95 |
| abstract_inverted_index.advanced | 49 |
| abstract_inverted_index.attacks, | 58 |
| abstract_inverted_index.concepts | 121 |
| abstract_inverted_index.defences | 115 |
| abstract_inverted_index.devices. | 20 |
| abstract_inverted_index.emerging | 82 |
| abstract_inverted_index.evolving | 70 |
| abstract_inverted_index.existing | 80 |
| abstract_inverted_index.networks | 76 |
| abstract_inverted_index.research | 118 |
| abstract_inverted_index.slicing, | 28 |
| abstract_inverted_index.systems. | 130 |
| abstract_inverted_index.wireless | 4, 75, 128 |
| abstract_inverted_index.Detection | 94 |
| abstract_inverted_index.Intrusion | 93 |
| abstract_inverted_index.challenge | 107 |
| abstract_inverted_index.exploited | 46 |
| abstract_inverted_index.landscape | 72 |
| abstract_inverted_index.networks, | 5 |
| abstract_inverted_index.prospects | 1 |
| abstract_inverted_index.resilient | 125 |
| abstract_inverted_index.reviewing | 78 |
| abstract_inverted_index.security. | 41 |
| abstract_inverted_index.spoofing, | 60 |
| abstract_inverted_index.strategic | 83 |
| abstract_inverted_index.Addressing | 105 |
| abstract_inverted_index.Frameworks | 97 |
| abstract_inverted_index.challenges | 38 |
| abstract_inverted_index.computing, | 30 |
| abstract_inverted_index.innovative | 114 |
| abstract_inverted_index.solutions. | 84 |
| abstract_inverted_index.unrivalled | 13 |
| abstract_inverted_index.Blockchain, | 99 |
| abstract_inverted_index.Distributed | 53 |
| abstract_inverted_index.encompasses | 26 |
| abstract_inverted_index.integration | 17 |
| abstract_inverted_index.capabilities | 111 |
| abstract_inverted_index.incorporated | 90 |
| abstract_inverted_index.multifarious | 19 |
| abstract_inverted_index.technologies | 89 |
| abstract_inverted_index.communication | 129 |
| abstract_inverted_index.connectivity, | 15 |
| abstract_inverted_index.cryptography, | 101 |
| abstract_inverted_index.manipulation. | 63 |
| abstract_inverted_index.sophisticated | 23 |
| abstract_inverted_index.technologies, | 11 |
| abstract_inverted_index.eavesdropping, | 59 |
| abstract_inverted_index.architecture— | 24 |
| abstract_inverted_index.authentication. | 104 |
| abstract_inverted_index.credential-less | 103 |
| abstract_inverted_index.next-generation | 74 |
| abstract_inverted_index.vulnerabilities | 43 |
| abstract_inverted_index.software-defined | 34 |
| abstract_inverted_index.counter-surveillance | 88 |
| abstract_inverted_index.networking—creates | 35 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 7 |
| citation_normalized_percentile.value | 0.51143443 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |