Study on Security and Privacy in 5G-Enabled Applications

25Citations
Citations of this article
56Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

5G applications face security risks due to the new technology used and the performance requirements of the specific application scenario. This paper analyzes the security requirements and presents hierarchical solutions for stakeholders to build secure 5G applications. First, we summarize the technical characteristics and typical usage scenarios of 5G. Then, we analyze the security and privacy risks faced by 5G applications and related security standards and research work. Next, we give the system reference architecture and overall security and privacy solutions for 5G applications. Based on the three major application scenarios of eMBB, uRLLC, and mMTC, we also provide specific suggestions for coping with security and privacy risks. Finally, we present a use case of industrial terminal access control and make conclusions of this paper.

Cite

CITATION STYLE

APA

Qiu, Q., Liu, S., Xu, S., & Yu, S. (2020). Study on Security and Privacy in 5G-Enabled Applications. Wireless Communications and Mobile Computing, 2020. https://doi.org/10.1155/2020/8856683

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free