An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.

Autor: Kalhoro, Shadab, Shaikh, Farhan Bashir, Kalhoro, Anam, Abbasi, Junaid-Ur-Rehman, Ayyasamy, Ramesh Kumar
Předmět:
Zdroj: ISeCure; Jan2024, Vol. 16 Issue 1, p17-35, 19p
Abstrakt: With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low-latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in 5G and existing proposed plans are centered on the security model of this study, with authentication, availability, confidentiality, integrity, visibility, and a centralized security policy. However, initiating innovative technologies and enhanced aspects in 5G communication raises new requirements and has presented various security challenges. 5G-based applications face security risks because they use modern technology. This paper presents a study of security attacks and the security risks faced by 5G intelligent applications. This article also investigates the three main 5G usage scenarios (i.e., eMBB, uRLLC, and mMTC). This research recommends reducing the security risks of 5G usage scenarios and intelligent applications. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index