2018
DOI: 10.1007/s11432-017-9426-4
|View full text |Cite
|
Sign up to set email alerts
|

Overview of 5G security technology

Abstract: The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(37 citation statements)
references
References 101 publications
(106 reference statements)
0
37
0
Order By: Relevance
“…Some more kinds of studies have been presented in Ji et al [47] who analyze the security requirements of 5G business applications, network architecture, the air interface, and user privacy, and in Panwar et al [48] who discussed the limitations of 4G networks and the features of 5G networks. The authors discussed the challenges, technologies, and implementation issues of these networks.…”
Section: Existing Surveys and Their Applicabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Some more kinds of studies have been presented in Ji et al [47] who analyze the security requirements of 5G business applications, network architecture, the air interface, and user privacy, and in Panwar et al [48] who discussed the limitations of 4G networks and the features of 5G networks. The authors discussed the challenges, technologies, and implementation issues of these networks.…”
Section: Existing Surveys and Their Applicabilitymentioning
confidence: 99%
“…The author presents the survey on the physical layer security techniques, challenges associated with these technologies and future trends. Ji et al [47] 2018 5G Networks The authors analyze the security requirements of 5G business applications, network architecture, the air interface, and user privacy. Panwar et al [48] 2016 5G mobile communication…”
Section: Key Contributionmentioning
confidence: 99%
“…Even with limited computational capability, PHY-security is able to provide secure communications for a massive number of IoT devices. Thus, PHY-security is particularly appealing to the 5G cellular IoT network [17][18][19]. The comparison of cryptography and PHY-security techniques is given in Table 2.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, mobile communication has witnessed rapid developments, and 5G as well as multiple-input and multiple-output (MIMO) antenna technology have received considerable attention from researchers [1][2][3]. Moreover, accurate location-based services (LBS), such as emergency road assistance, location-based advertisements, location-based messaging and route navigation [4,5], have become popular topics of research.…”
Section: Introductionmentioning
confidence: 99%