DSpace Repository

Security and Threats Analysis on 5g Wireless Networks

Show simple item record

dc.contributor.author Ghosh, Tusher Chandra
dc.date.accessioned 2022-02-23T06:09:11Z
dc.date.available 2022-02-23T06:09:11Z
dc.date.issued 2021-05-03
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/7261
dc.description.abstract We are going to enter the world of the 5G network. There are many advanced features in the 5G network. The more new features come, the more security will be required, for all these new features. This paper is a survey for 5 generations of wireless network security, complete and thorough our current cellular network. This paper starts with a rethink of 5G wireless networks circumstantial as well as on the new pretension and motivations of 5G wireless security. The effective offensive and security services with the thought of new service necessity and new use cases in 5G wireless networks are then summarized. The recent improvement and the existing design for the 5G wireless security are presented based on similar security services including authentication, availability, data confidentiality, key management and privacy. Use of 5G networks such as Internet of Things (IoT), Large Multiple-Input Multiple-Output (MIMO), Peer-to-Peer Communication (P2P), Big Data and Cloud Computing. Based on the development of this protection and research, new 5G mobile wireless protection has been explained. New strategies for future mobile wireless networks also need to be developed. Summarizes future directions and goals in 5G security systems. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.subject 5G mobile communication systems en_US
dc.subject Cloud computing en_US
dc.title Security and Threats Analysis on 5g Wireless Networks en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics