Chapter 8
Securing Massive IoT Deployments in 5G
After reading this chapter, you should have a better understanding of the following topics:
Threats in massive IoT use case deployments
Securing massive IoT networks
Real scenario case study examples of massive IoT threat surfaces and threat mitigation techniques
This chapter will take you through the threat surfaces in 5G massive IoT deployments and mechanisms to mitigate the threats.
This chapter will be of particular interest to the following teams from enterprise, industry verticals, Non-Public Networks (NPN), 5G service providers deploying 5G mIoT, and cybersecurity vendors planning product developments and new functionalities to secure 5G mIoT use cases.
Mobile infrastructure strategy ...
Get Securing 5G and Evolving Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.