A Comprehensive Guide to 5G Security 2018
DOI: 10.1002/9781119293071.ch2
|View full text |Cite
|
Sign up to set email alerts
|

5G Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…These categories are: (i) enhanced mobile broadband (eMBB), (ii) ultra-reliable and low latency communication (uRLLC), and (iii) massive machine-type communication (mMTC), as depicted in Figure 4. Table 4 provides an overview of the essential 5G requirements related to SRPS from both user experience and network management perspectives [98]. The twelve 5G requirements can be grouped into user experience, network management, and hybrid requirements.…”
Section: E: Protection Of Subscriber's Identitymentioning
confidence: 99%
See 1 more Smart Citation
“…These categories are: (i) enhanced mobile broadband (eMBB), (ii) ultra-reliable and low latency communication (uRLLC), and (iii) massive machine-type communication (mMTC), as depicted in Figure 4. Table 4 provides an overview of the essential 5G requirements related to SRPS from both user experience and network management perspectives [98]. The twelve 5G requirements can be grouped into user experience, network management, and hybrid requirements.…”
Section: E: Protection Of Subscriber's Identitymentioning
confidence: 99%
“…An efficient security design for 5G-enabled networks for SRPS will guarantee security at three levels: access, infrastructure and service. It will also ensure the security and safety of its enabling technologies [98].…”
Section: ) Massive Mimo (Multiple-input Multiple-output)mentioning
confidence: 99%