Skip to Main Content
A Comprehensive Guide to 5G Security
book

A Comprehensive Guide to 5G Security

by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
March 2018
Intermediate to advanced content levelIntermediate to advanced
474 pages
16h 49m
English
Wiley
Content preview from A Comprehensive Guide to 5G Security

13 5G Positioning: Security and Privacy Aspects

Elena Simona Lohan1, Anette Alén‐Savikko2, Liang Chen3, Kimmo Järvinen4, Helena Leppäkoski1, Heidi Kuusniemi3, and Päivi Korpisaari2

1 Tampere University of Technology

2 University of Helsinki, Faculty of Law

3 Finnish Geospatial Research Institute

4 University of Helsinki, Department of Computer Science

13.1 Introduction

Positioning has so far been an add‐on feature to mobile phone standards. Wireless positioning typically relies on power‐hunger technology and has traditionally been designed and optimized separately from the communication part. With the advent of 5G communications, this is likely to change and joint communication‐positioning architectures based on 5G are expected to be implemented. The official 3GPP target for future cellular networks is to support 1 trillion devices [3]. The 5G concept is based on dense access point deployment and very large bandwidths, and thus it has an intrinsic capacity to achieve very accurate positioning, at extremely low energy consumption in mobile device. However, this requires a careful design of the 5G network in order to utilize fully this positioning potential without a negative impact on the communications features. The top candidates in future 5G positioning are likely to rely on Time of Arrival (TOA), Time Difference of Arrival (TDOA), Direction or angle of Arrival (DOA), and Received Signal Strength (RSS) information. 5G white papers [3,81] specify that the enhanced 5G services ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119293040Purchase book