1Introduction
1.1 Overview
The 5G Explained presents key aspects of the next, evolved mobile communications system after the 4G era. This book concentrates on the deployment of 5G and discusses the security‐related aspects whilst concrete guidelines of both topics for the earlier generations can be found in the previously published books of the author in Refs. [1,2].
The fifth generation is a result of long development of mobile communications, the roots of its predecessors dating back to the 1980s when the first‐generation mobile communication networks started to convert into a reality [3]. Ever since, the new generations up to 4G have been based on the earlier experiences and learnings, giving the developers a base for designing enhanced security and technologies for the access, transport, signaling, and overall performance of the systems.
Regardless of the high performance of 4G systems, the telecom industry has identified a need for faster end‐user data rates due to constantly increasing performance requirements of the evolving multimedia. 5G systems have thus been designed to cope with these challenges by providing more capacity and enhanced user experiences that solve all the current needs even for the most advanced virtual reality applications. At the same time, the exponentially enhancing and growing number of IoT (Internet of Things) devices requires new security measures such as security breach monitoring, prevention mechanisms, and novelty manners to tackle the vast ...