Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

12User Privacy, Identity and Trust in 5G

Tanesh Kumar1, Madhusanka Liyanage1, Ijaz Ahmad1, An Braeken2, and Mika Ylianttila1

1 Centre for Wireless Communications (CWC), University of Oulu, Finland

2 Industrial Engineering INDI, Vrije Universiteit Brussel VUB, Nijverheidskaai, Brussels

12.1 Introduction

5G systems are the next major transition in the way of future mobile communications. 5G technology promises to provide higher bandwidth and lower latency. Unlike the traditional mobile technologies, which are mainly meant for voice and data communications, 5G ensures to provide much more. 5G technology has the great potential to enable services for new use cases and vertical industries, for example, in the healthcare, transportation and smart homes. It provides opportunities for companies to build new business models to deliver novel services to consumers in more improved and efficient ways, as well as to increase their revenue. This rise in new business models, architecture and technological changes in 5G will bring new challenges to the user’s privacy. The privacy requirements is one of the crucial elements to consider in the discussion of 5G technology as it is of utmost importance to balance the privacy requirements of users with respect to the services offered.

The on‐going mobile networks mainly consider four security aspects, that are; authentication, integrity, confidentiality and availability. However, the privacy requirements are not at all (not only) taken into account ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book