12Security Protocols for Mobile Communications
Divya Priyadharshini M.1*, Divya R.1, Ponmurugan P.1 and Balamurugan S.2
1 Department of Electrical and Electronics Engineering, Sri Krishna College of Technology, Kovaipudur, Coimbatore, India
2 Department of Research and Development, Quantis IS and CS Technologies, Coimbatore, India
Abstract
Internet of Things is the bread and butter for the future wireless network communications. The advancement in these technologies is also demanding advanced security. The chapter begins with the introduction to communication networks and importance of the security of network. It has also summarized the various available mobile communication technologies, the threats faced by them and the measures undertaken for avoiding those threats. In the proposed method section an approach for integrating LoRaWAN and 5G has been discussed with security challenges faced by the system. By integrating the systems low power, low latency and higher efficient system is achieved. RFID along with PLS is used to address the security issues discussed along with result and performance measures. Further the chapter concludes by summarizing the proposed method and its analysis.
Privacy and data confidentiality will be a severe problem in 5G networks PLS provides data security, asymmetric cryptographic algorithm provides location security. In the proposed system a LoRa connected 5G system, RFID authentication along with PLS is used, which will address most of the 5G ...
Get Design and Analysis of Security Protocol for Communication now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.