Fundamentals of 5G Mobile Networks 2015
DOI: 10.1002/9781118867464.ch9
|View full text |Cite
|
Sign up to set email alerts
|

Security for 5G Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
37
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 62 publications
(37 citation statements)
references
References 11 publications
0
37
0
Order By: Relevance
“…On the other hand, regarding solutions devoted to detecting and mitigating attacks in the cyber security space, several approaches are proposing new ways of dealing with the challenges of 5G networks need to face. For example, a list of potential cyber threats in current networks is presented in [18], including attacks that could also be used to disrupt the operation of future 5G networks. The authors note that botnets, especially the mobile ones, are expected to continue to exist in 5G mobile networks as one of the most powerful cyber threats nowadays [19].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, regarding solutions devoted to detecting and mitigating attacks in the cyber security space, several approaches are proposing new ways of dealing with the challenges of 5G networks need to face. For example, a list of potential cyber threats in current networks is presented in [18], including attacks that could also be used to disrupt the operation of future 5G networks. The authors note that botnets, especially the mobile ones, are expected to continue to exist in 5G mobile networks as one of the most powerful cyber threats nowadays [19].…”
Section: Related Workmentioning
confidence: 99%
“…Among relevant works on security concerns over 5G cellular network, Mantas et al [35] surveyed probable threats and attacks against the core modules of 5G cellular networks. The authors also confirmed the four conventional attractive targets in the 4G cellular network: user equipment (UE); access network; the mobile operator’s core network; and external Internet Protocol networks.…”
Section: Related Workmentioning
confidence: 99%
“…Mantas et al [18] investigated some of the potential threats and attacks against the main components of 5G systems. The authors mainly focus on security issues related to the user equipment, and although they brie y go beyond that, they do not present security issues that open up as a result of SCaaS, NFV, and MEC.…”
Section: State-of-the-artmentioning
confidence: 99%