Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

4Design Principles for 5G Security

Ijaz Ahmad1, Madhusanka Liyanage1, Shahriar Shahabuddin1, Mika Ylianttila1, and Andrei Gurtov2

1 Centre for Wireless Communications (CWC), University of Oulu, Finland

2 Department of Computer and Information Science, Linköping University, Linköping, Sweden

4.1 Introduction

The vision of the 5G wireless networks lies in providing very high data rates, higher coverage through dense base station deployment with increased capacity, significantly better Quality of Service (QoS), and extremely low latency [1]. 5G is considered to provide broadband access everywhere, entertain higher user mobility, enable connectivity of a massive number of devices (e.g. IoT), and the connectivity will be ultra‐reliable and affordable [2]. The development towards an all‐IP‐based communication, for example in 4G, has already helped develop new business opportunities, provide new online services and connect industrial machines, home appliances and business units. However, with this development, the security challenges and threat vectors have also increased.

Wireless communication systems were prone to security vulnerabilities from the very beginning. In the first generation (1G) wireless networks, mobile phones and wireless channels were targeted for illegal cloning and masquerading. In the second generation (2G) of wireless networks, message spamming became common, not only by pervasive attacks but also by injecting false information or broadcasting unwanted marketing ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book