Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

11 IoT Security

Mehrnoosh Monshizadeh1,2 and Vikramajeet Khatri1

1 Nokia Bell Labs, Finland

2 Aalto University, Finland

11.1 Introduction

Mobile network operators should meet connectivity requirements for new applications, which will be released in coming years. Comparing to Long Term Evolution (LTE) networks, 5G will offer increased data rate, reduced end‐to‐end latency, and improved coverage, which are essential factors for many Internet of Things (IoT) applications such as unmanned cars, smart cities and intelligent transportation systems. Figure 11.1 shows the 5G use cases and requirements [1].

Venn diagram with triangles at the center depicting 5G use cases and requirements. The circles are labeled “Unlimited experience,” For everything,” and “Instant action.”

Figure 11.1 5G use cases and requirements [1].

The existing technologies of cloud computing, IoT, and wireless controlled robots combine to produce a new variant called Cloud Robotics. Cloud Robotics uses the big data techniques and computing power of the cloud along with the connectivity provided by 5G, LTE and other wireless technologies to control the actions of wireless robots. We shall refer to this technology as Mobile Cloud Robot (MCR), where the robot‐cloud connectivity is provided by mobile networks. This technology has the mutual attention of telecommunication vendors as well as different industries, including manufacturing, medicine and agriculture.

Because of the operational characteristics of resource sharing and a centralized controller, MCR can act as a potential ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book