Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

25G Mobile Networks: Requirements, Enabling Technologies, and Research Activities

Van‐Giang Nguyen, Anna Brunstrom, Karl‐Johan Grinnemo, and Javid Taheri

Department of Computer Science, Karlstad University, Karlstad, Sweden

2.1 Introduction

In the previous chapter, we have seen the history and evolution of the four generations of mobile cellular systems. After more than three decades of evolution, mobile cellular systems have significantly changed from analog or circuit‐based to packet‐based communication systems, with also big changes in the speed and bandwidth improvement as well as the number of connected devices. According to a forecast by Ericsson [1], the number of connected devices is growing rapidly and will reach to close to 28 billion by 2021, with around 16 billion Internet of Things (IoT) related devices.

This big change in the demand from users and the emergence of new services, and the increase of the communication needs from vertical industrial sectors such as automotive, agriculture, health, and transport, impose a huge challenge on the current generation of mobile cellular system (i.e. 4G). As a consequence, it requires the development of the next generation mobile system or fifth generation (5G), which is expected to be an ecosystem for every Internet‐enabled device. In the following, we will explore more about the vision of the 5G system and its typical use cases to see how it differs from today’s 4G mobile networks.

2.1.1 What is 5G?

Since 5G is still in ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book