Latest Advances on Security Architecture for 5GTechnology and Services
نویسندگان
چکیده
The roll out of the deployment 5G technology has been ongoing globally. technologies associated with seen mixed reaction as regards its prospects to improve communication services in all spares life amid security concerns. concerns network lies architecture and other that optimize performance architecture. There are many fractions literature, a holistic architectural structure will go long way tackling challenges. In this paper, review challenges based on is presented along their proposed solutions. This was carried some keywords relating securities architecture; used retrieve appropriate literature for fitness purpose. architectures majorly centered around seven layers; thereby making each layers source concern network. Many related authentication authorization such denial-of-service attacks, man middle attack eavesdropping. Different methods both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) software (Artificial intelligence, Machine learning, Blockchain, Statistical Process Control) mitigating threats. Other applicable includes: Multi-radio access technology, smart-grid light fidelity. implementation these solutions should be reviewed timely basis because dynamic nature threats which greatly reduce occurrence attacks
منابع مشابه
turkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Security Architecture for Web Services
Web services are quickly becoming the most popular tool for distributed computing. Due to this popularity a comprehensive security architecture is needed. In this paper we introduced such a comprehensive architecture that includesin addition to the standard services of integrity and confidentialityauthentication, authorization and a defense against denial of service attacks. This model builds o...
متن کاملA Security Architecture for Mobility-Related Services
In future wireless networks, mobility-related services, such as Candidate Access Router Discovery, will play a significant role in realizing truly ubiquitous, seamless connectivity. In order for these services to be realized, however, their particular security concerns must be addressed. Moreover, the security solution must be flexible and highly configurable in order to meet the demands of int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Software Engineering and Computer Systems
سال: 2023
ISSN: ['2289-8522', '2180-0650']
DOI: https://doi.org/10.15282/ijsecs.9.1.2023.3.0107