12User Privacy, Identity and Trust in 5G

Tanesh Kumar1, Madhusanka Liyanage1, Ijaz Ahmad1, An Braeken2, and Mika Ylianttila1

1 Centre for Wireless Communications (CWC), University of Oulu, Finland

2 Industrial Engineering INDI, Vrije Universiteit Brussel VUB, Nijverheidskaai, Brussels

12.1 Introduction

5G systems are the next major transition in the way of future mobile communications. 5G technology promises to provide higher bandwidth and lower latency. Unlike the traditional mobile technologies, which are mainly meant for voice and data communications, 5G ensures to provide much more. 5G technology has the great potential to enable services for new use cases and vertical industries, for example, in the healthcare, transportation and smart homes. It provides opportunities for companies to build new business models to deliver novel services to consumers in more improved and efficient ways, as well as to increase their revenue. This rise in new business models, architecture and technological changes in 5G will bring new challenges to the user’s privacy. The privacy requirements is one of the crucial elements to consider in the discussion of 5G technology as it is of utmost importance to balance the privacy requirements of users with respect to the services offered.

The on‐going mobile networks mainly consider four security aspects, that are; authentication, integrity, confidentiality and availability. However, the privacy requirements are not at all (not only) taken into account ...

Get A Comprehensive Guide to 5G Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.