>
Fa   |   Ar   |   En
   an overview of security attacks in 5g enabled technologies: applications and use case scenarios  
   
نویسنده kalhoro shadab ,shaikh farhan bashir ,kalhoro anam ,abbasi junaid-ur-rehman ,ayyasamy ramesh kumar
منبع the isc international journal of information security - 2024 - دوره : 16 - شماره : 1 - صفحه:17 -35
چکیده    With the advancement of icts, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. the recent developments in the fifth generation and existing proposed plans are centred on the security model of this study, with authentication, availability, confidentiality, integrity, visibility, and centralized security policy. however, initiating innovative technologies and enhanced aspects in the 5th generation communication raises new requirements and has given various security challenges. 5g-based applications face security risks because of using modern technology. this paper presents a study of security attacks and the security risks faced by 5g intelligent applications. this research article also investigates the three main 5g usage scenarios (i.e., embb, urllc, and mmtc). this research recommends the steps to be taken to reduce the security risks of 5g usage scenarios intelligent applications.
کلیدواژه 5g ,mobile communication ,security attacks ,security models ,5g usage scenarios ,intelligent applications
آدرس university tunku abdul rahman (utar), faculty of information and communication technology, department of computer science, malaysia, university tunku abdul rahman(utar), faculty of information and communication technology, department of computer science, malaysia, university of sindh, department of computer science, pakistan, university tunku abdul rahman (utar), faculty of engineering and green technology, malaysia, university tunku abdul rahman(utar), faculty of information and communication technology, department of computer science, malaysia
پست الکترونیکی example@utar.my
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved