II.JammingJamming, unlike eavesdropping and traffic analysis, will fully interrupt legitimate user communications.Figure 5b depicts a jamming attack. The malicious node can cause deliberate intrusion, causinglegitimate users' data communications to be interrupted. Jamming can also make it impossible forapproved users to access radio services. Active attack solutions are usually detection-based.III.Dos and DDosAn adversary's network resources can be depleted by DoS attacks. DoS is a network availability breachcaused by a security attack. A DoS assault can be launched using jamming. When there are severaldistributed adversaries, a DDoS can be created. A DDoS model is shown in Figure 5c. Both DoS and DDoSare active attacks that can be used at various layers. Detection is currently used to identify DoS and DDoSattacks. DoS and DDoS will undoubtedly become a major challenge for operators as the penetration oflarge devices in 5G wireless networks increases. In 5G wireless networks, DoS and DDoS attacks will use alarge number of connected devices to target the access network. A DoS attack can be classified as eithera network infrastructure DoS attack or a device/user DoS attack, depending on the target. A DoS attackon network infrastructure can target the signalling plane, user plane, management plane, supportsystems, radio resources, logical and physical resources, and so on. DoS attacks on devices and users cantarget battery, memory, disc, Processor, radio, actuators, and sensors.