Research Article
Overview of 5G & Beyond Security
@ARTICLE{10.4108/eetiot.v8i30.1624, author={Fawad Shokoor and Wasswa Shafik and S. Mojtaba Matinkhah}, title={Overview of 5G \& Beyond Security}, journal={EAI Endorsed Transactions on Internet of Things}, volume={8}, number={30}, publisher={EAI}, journal_a={IOT}, year={2022}, month={6}, keywords={5G \& Beyond, Network Security, Internet of Things, Software-Defined Networking, Network Function Virtualization}, doi={10.4108/eetiot.v8i30.1624} }
- Fawad Shokoor
Wasswa Shafik
S. Mojtaba Matinkhah
Year: 2022
Overview of 5G & Beyond Security
IOT
EAI
DOI: 10.4108/eetiot.v8i30.1624
Abstract
Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences, and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth Generation (5G) and security aspect. This is more predictable since the core technology; the synonymous approach is possible with Fifth Generation (5G) and Beyond Technologies though with limited access. Many incidents have shown that the possibility of a hacked wireless network, not just impacts privacy and security worries, but also hinders the diverse dynamics of the ecosystem. Security attacks have grown in frequency and severity throughout the near past, making detection mechanisms harder.
Copyright © 2022 Fawad Shokoor et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.