148 research outputs found

    5G Security Challenges and Solutions: A Review by OSI Layers

    Get PDF
    The Fifth Generation of Communication Networks (5G) envisions a broader range of servicescompared to previous generations, supporting an increased number of use cases and applications. Thebroader application domain leads to increase in consumer use and, in turn, increased hacker activity. Dueto this chain of events, strong and efficient security measures are required to create a secure and trustedenvironment for users. In this paper, we provide an objective overview of5G security issues and theexisting and newly proposed technologies designed to secure the5G environment. We categorize securitytechnologies usingOpen Systems Interconnection (OSI)layers and, for each layer, we discuss vulnerabilities,threats, security solutions, challenges, gaps and open research issues. While we discuss all sevenOSIlayers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers,the physical layer between the base stations and users’ device presents increased opportunities for attackssuch as eavesdropping and data fabrication. However, no singleOSI layer can stand on its own to provideproper security. All layers in the5G must work together, providing their own unique technology in an effortto ensure security and integrity for5G data

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Project BeARCAT : Baselining, Automation and Response for CAV Testbed Cyber Security : Connected Vehicle & Infrastructure Security Assessment

    Get PDF
    Connected, software-based systems are a driver in advancing the technology of transportation systems. Advanced automated and autonomous vehicles, together with electrification, will help reduce congestion, accidents and emissions. Meanwhile, vehicle manufacturers see advanced technology as enhancing their products in a competitive market. However, as many decades of using home and enterprise computer systems have shown, connectivity allows a system to become a target for criminal intentions. Cyber-based threats to any system are a problem; in transportation, there is the added safety implication of dealing with moving vehicles and the passengers within

    Security-centric analysis and performance investigation of IEEE 802.16 WiMAX

    Get PDF
    fi=vertaisarvioitu|en=peerReviewed

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; ‱ Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)‱ Millimeter Waves and Spectrum Management‱ Cyber Security‱ Device to Device Communicatio

    Context-aware mobile applications design: implications and challeges for a new indusy

    Get PDF
    Context-aware computing is slowly becoming the new mobile paradigm in which applications can discover and use information “out and about”. Typical sources of knowledge about context are the device’s location, data about the environment at large, the mobile device’s prior activity log and even the user’s biometrics. The mobile industry agrees that this paradigm improves the appeal and value of applications by personalising and adapting them to the context in which they run. However, capturing contextual information and processing it to enhance or create a new application is a daunting task: it involves scattered systems and infrastructures and an increasingly wide array of heterogeneous data, architectures and technological tools. In this paper, we explore and analyse existing mobile context-aware applications and the proposed frameworks that enable them. The paper aims to clarify the echnological choices behind context-aware mobile applications and the challenges that still remain ahead for this area to fulfil the promises it offers
    • 

    corecore