2018
DOI: 10.13052/jicts2245-800x.532
|View full text |Cite
|
Sign up to set email alerts
|

Market Dynamics and Security Considerations of 5G

Abstract: The 5 th Generation (5G) of mobile communication systems will bring massive changes in the dynamics of the Information and Communication Technology (ICT) industry. The applications of 5G technology are well-positioned to address the ever-increasing demand for enhanced service experience. With digitization on its way to touch every part of life, Internet of Things (IoT) will be integral part of 5G from the very beginning; this is unlike 4G where IoT came later. However, open issues such as market demand, techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 23 publications
(19 reference statements)
0
5
0
Order By: Relevance
“…The amount of information may become even larger if other critical factors are considered, such as cyber-security indicators [1], or in case network monitoring data [5] are directly put as an input to the forecast model. These complex models with a wide variety of features are the rationale behind the so-called big data trend, recently emerged in both the scientific community [22] and the ICT market [4,13]. Mapping this kind of big data structures into intelligible models is a formidable problem.…”
Section: Related Workmentioning
confidence: 99%
“…The amount of information may become even larger if other critical factors are considered, such as cyber-security indicators [1], or in case network monitoring data [5] are directly put as an input to the forecast model. These complex models with a wide variety of features are the rationale behind the so-called big data trend, recently emerged in both the scientific community [22] and the ICT market [4,13]. Mapping this kind of big data structures into intelligible models is a formidable problem.…”
Section: Related Workmentioning
confidence: 99%
“…This section presents the architecture, technology and security aspects of 5G that would cater for the Tele-healthcare use cases and applications presented in Section 7.2. The reader may find more information about 5G network domains, architectures and slicing in [22] and [23], respectively.…”
Section: G Communication Systemmentioning
confidence: 99%
“…The most likely initial deployment options are illustrated in Figure 7.5 a) and c) (see e.g. [22] and [23]).…”
Section: G Reference Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The results obtained from the primary and secondary data show that there are some important cybersecurity issues related to the use of 4G and 5G telecommunication networks that need to be considered by the regulators. The result was compared with the results of previous work reported in [13,14] for validation. The intrusion detection rate in the proposed approach can be varied according to the number of nodes that arrived in the network.…”
Section: Introductionmentioning
confidence: 96%