Latest Advances on Security Architecture for 5GTechnology and Services

نویسندگان

چکیده

The roll out of the deployment 5G technology has been ongoing globally. technologies associated with seen mixed reaction as regards its prospects to improve communication services in all spares life amid security concerns. concerns network lies architecture and other that optimize performance architecture. There are many fractions literature, a holistic architectural structure will go long way tackling challenges. In this paper, review challenges based on is presented along their proposed solutions. This was carried some keywords relating securities architecture; used retrieve appropriate literature for fitness purpose. architectures majorly centered around seven layers; thereby making each layers source concern network. Many related authentication authorization such denial-of-service attacks, man middle attack eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) mitigating threats. Other applicable includes: Multi-radio access technology, smart-grid light fidelity. implementation these solutions should be reviewed timely basis because dynamic nature threats which greatly reduce occurrence attacks

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

A Security Architecture for Web Services

Web services are quickly becoming the most popular tool for distributed computing. Due to this popularity a comprehensive security architecture is needed. In this paper we introduced such a comprehensive architecture that includesin addition to the standard services of integrity and confidentialityauthentication, authorization and a defense against denial of service attacks. This model builds o...

متن کامل

A Security Architecture for Mobility-Related Services

In future wireless networks, mobility-related services, such as Candidate Access Router Discovery, will play a significant role in realizing truly ubiquitous, seamless connectivity. In order for these services to be realized, however, their particular security concerns must be addressed. Moreover, the security solution must be flexible and highly configurable in order to meet the demands of int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Software Engineering and Computer Systems

سال: 2023

ISSN: ['2289-8522', '2180-0650']

DOI: https://doi.org/10.15282/ijsecs.9.1.2023.3.0107