A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions / R. Khan, P. Kumar, D. N. K. Dzhayakodi (Jayakody) Arachshiladzh, M. Liyanage

Уровень набора: IEEE Communications Surveys and TutorialsАльтернативный автор-лицо: Khan, R., specialist in the field of informatics and computer technology, Research Engineer of Tomsk Polytechnic University, 1987-, Rabia;Kumar, P., Pardeep;Dzhayakodi (Jayakody) Arachshiladzh, D. N. K., specialist in the field of electronics, Professor of Tomsk Polytechnic University, 1983-, Dushanta Nalin Kumara;Liyanage, M.Коллективный автор (вторичный): Национальный исследовательский Томский политехнический университет, Инженерная школа информационных технологий и робототехники, Научно-образовательный центр "Автоматизация и информационные технологии"Язык: английский.Страна: .Резюме или реферат: Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research..Примечания о наличии в документе библиографии/указателя: [References: 372 tit.].Аудитория: .Тематика: труды учёных ТПУ | электронный ресурс | 5G mobile communication | privacy | tutorials | business | telecommunications | authentication | мобильная связь | конфиденциальность | телекоммуникации | аутентификация Ресурсы он-лайн:Щелкните здесь для доступа в онлайн
Тэги из этой библиотеки: Нет тэгов из этой библиотеки для этого заглавия. Авторизуйтесь, чтобы добавить теги.
Оценка
    Средний рейтинг: 0.0 (0 голосов)
Нет реальных экземпляров для этой записи

Title screen

[References: 372 tit.]

Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.

Для данного заглавия нет комментариев.

оставить комментарий.