As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The future of mobile and Internet technologies envisions advances beyond the existing scope of science. The concepts of automatic driving and machine-type communication are quite sophisticated and require the upgrading and improvement of the current mobile infrastructure. 5G mobile technology serves as a solution, although there is no approximate network infrastructure to meet the service guarantees. The mobile network is today’s demand, and the telecommunications industries are creating new infrastructures and technologies to provide more benefits to end-users and to meet their demands. Compared to the 4G network, 5G provides many new security features and has more sophisticated and robust security mechanisms, although there are still many potential security issues with the 5G network. Therefore, security analysis of 5G infrastructure is very crucial. This article analyzes the security requirements of 5G business applications, network architecture, and user privacy. At the same time, it is a comprehensive study of various threats and solutions to ensure the security and privacy of 5G.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.