Evaluation On 5g Network And Security Report
VerifiedAdded on 2022/09/18
|20
|2663
|31
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: EVALUATION OF 5G NETWORK AND THE SECURITY
EVALUATION OF 5G NETWORK AND THE SECURITY
Name of student
Name of university
Author’s note:
EVALUATION OF 5G NETWORK AND THE SECURITY
Name of student
Name of university
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
EVALUATION OF 5G NETWORK AND THE SECURITY
Table of Contents
Introduction:...............................................................................................................................2
Motivation:.................................................................................................................................2
Discussion:.................................................................................................................................2
Comparison of cellular networks:..........................................................................................2
5G Architecture:...................................................................................................................15
Identification and Analysis of 5G Attacks:..........................................................................15
Identification and Analysis of 5G limitation in network coverage:.....................................17
Conclusion:..............................................................................................................................17
EVALUATION OF 5G NETWORK AND THE SECURITY
Table of Contents
Introduction:...............................................................................................................................2
Motivation:.................................................................................................................................2
Discussion:.................................................................................................................................2
Comparison of cellular networks:..........................................................................................2
5G Architecture:...................................................................................................................15
Identification and Analysis of 5G Attacks:..........................................................................15
Identification and Analysis of 5G limitation in network coverage:.....................................17
Conclusion:..............................................................................................................................17
2
EVALUATION OF 5G NETWORK AND THE SECURITY
Introduction:
The report analyses the 5G technology in details, which include Comparison of the existing
cellular networks generations (5G, 4G, 3G, and 2G) in terms of Communication spectrum,
modulation techniques, medium access control mechanism, Network speed and bandwidth
utilization and Security techniques and risk. The report Explore the architecture of a 5G
network to provide a comprehensive overview regarding the mechanism of 5G technology.
The report then identifies and analyses the 5G attacks on the access and core networks to
describe how 5G networks are exploited which affects the security of the data that is sent and
received through this network. Along with this the report provides a detailed description
regarding the limitation of the 5G network, especially in terms of media coverage. The report
not only describes limitation of 5G technology in terms of media coverage, but it also include
solution to this limitation which is discussed along with the limitation in this context.
Motivation:
The 4G technology or LTE has already set standard of high speed mobile internet and 5G
technology will enhance this speed even further to offer truly high speed network that the
previous generation technology such as 1G, 2G, 3G and even the high speed 4G LTE
technology has not offered yet . Therefore, 5G technology is the next technological
revolution that consumers should care about as it offers context for revolutionize telecom and
other industries as well.
Discussion:
Comparison of cellular networks:
Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) includes
analysis of:
a. spectrum for Communication
EVALUATION OF 5G NETWORK AND THE SECURITY
Introduction:
The report analyses the 5G technology in details, which include Comparison of the existing
cellular networks generations (5G, 4G, 3G, and 2G) in terms of Communication spectrum,
modulation techniques, medium access control mechanism, Network speed and bandwidth
utilization and Security techniques and risk. The report Explore the architecture of a 5G
network to provide a comprehensive overview regarding the mechanism of 5G technology.
The report then identifies and analyses the 5G attacks on the access and core networks to
describe how 5G networks are exploited which affects the security of the data that is sent and
received through this network. Along with this the report provides a detailed description
regarding the limitation of the 5G network, especially in terms of media coverage. The report
not only describes limitation of 5G technology in terms of media coverage, but it also include
solution to this limitation which is discussed along with the limitation in this context.
Motivation:
The 4G technology or LTE has already set standard of high speed mobile internet and 5G
technology will enhance this speed even further to offer truly high speed network that the
previous generation technology such as 1G, 2G, 3G and even the high speed 4G LTE
technology has not offered yet . Therefore, 5G technology is the next technological
revolution that consumers should care about as it offers context for revolutionize telecom and
other industries as well.
Discussion:
Comparison of cellular networks:
Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) includes
analysis of:
a. spectrum for Communication
3
EVALUATION OF 5G NETWORK AND THE SECURITY
b. techniques for modulation
c. mechanism for controlling access to medium
d. speed of Network and utilization of bandwidth
e. Security techniques and risk
Topics for comparison Technology Description
spectrum for Communication [1] 1G 1G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 150MHz /
900MHz
2G 2G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 1.8GHz
(900MHz), digital
telecommunication
3G 3G technology consider
the following spectrum
configuration for
EVALUATION OF 5G NETWORK AND THE SECURITY
b. techniques for modulation
c. mechanism for controlling access to medium
d. speed of Network and utilization of bandwidth
e. Security techniques and risk
Topics for comparison Technology Description
spectrum for Communication [1] 1G 1G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 150MHz /
900MHz
2G 2G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 1.8GHz
(900MHz), digital
telecommunication
3G 3G technology consider
the following spectrum
configuration for
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
EVALUATION OF 5G NETWORK AND THE SECURITY
providing service to the
consumers:
Frequency: 1.6 – 2.0 GHz
4G 4G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 2 – 8 GHz
5G 5G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 30-300 GHz
techniques for modulation [2] 1G the modulation technique
that is considered in the
1G technology is
analog frequency
modulation
2G the modulation technique
that is considered in the
2G technology is
EVALUATION OF 5G NETWORK AND THE SECURITY
providing service to the
consumers:
Frequency: 1.6 – 2.0 GHz
4G 4G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 2 – 8 GHz
5G 5G technology consider
the following spectrum
configuration for
providing service to the
consumers:
Frequency: 30-300 GHz
techniques for modulation [2] 1G the modulation technique
that is considered in the
1G technology is
analog frequency
modulation
2G the modulation technique
that is considered in the
2G technology is
5
EVALUATION OF 5G NETWORK AND THE SECURITY
Gaussian Minimum Shift
Keying which is referred
to as Gaussian filtered
Minimum Shift Keying
3G the modulation technique
that is considered in the
3G technology is
8PSK modulation scheme
4G the modulation
techniques that are
considered in the 4G
technology are phase-
shift keying (QPSK), 16-
phase quadrature
amplitude modulation
(16QAM), or 64-state
quadrature amplitude
modulation (64QAM)
5G the modulation
techniques that are
considered in the 5G
technology are Filter
Bank Multi-Carrier
(FBMC), Universal
EVALUATION OF 5G NETWORK AND THE SECURITY
Gaussian Minimum Shift
Keying which is referred
to as Gaussian filtered
Minimum Shift Keying
3G the modulation technique
that is considered in the
3G technology is
8PSK modulation scheme
4G the modulation
techniques that are
considered in the 4G
technology are phase-
shift keying (QPSK), 16-
phase quadrature
amplitude modulation
(16QAM), or 64-state
quadrature amplitude
modulation (64QAM)
5G the modulation
techniques that are
considered in the 5G
technology are Filter
Bank Multi-Carrier
(FBMC), Universal
6
EVALUATION OF 5G NETWORK AND THE SECURITY
Filtered Multi-Carrier
(UFMC), Generalized
Frequency Division
Multiplexing (GFDM),
Filtered OFDM (f-
OFDM)
mechanism for controlling access to
medium [3]
1G In order to provide
medium access control,
the mechanism that is
used is frequency-
division multiple access
(FDMA) where the
available bandwidth is
divided into frequency
bands without
overlapping with each
other
2G In order to provide
medium access control,
the techniques that are
considered are time-
division multiple access
(TDMA) and code-
division multiple access
EVALUATION OF 5G NETWORK AND THE SECURITY
Filtered Multi-Carrier
(UFMC), Generalized
Frequency Division
Multiplexing (GFDM),
Filtered OFDM (f-
OFDM)
mechanism for controlling access to
medium [3]
1G In order to provide
medium access control,
the mechanism that is
used is frequency-
division multiple access
(FDMA) where the
available bandwidth is
divided into frequency
bands without
overlapping with each
other
2G In order to provide
medium access control,
the techniques that are
considered are time-
division multiple access
(TDMA) and code-
division multiple access
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
EVALUATION OF 5G NETWORK AND THE SECURITY
(CDMA)
3G In order to provide
medium access control,
code-division multiple
access (CDMA) is
considered
4G In order to provide
medium access control, it
combines multiple-input,
multiple-output (MIMO)
technology with
orthogonal frequency-
division multiplexing
(OFDM)
5G In order to provide
medium access control, it
combines technologies
Massive Multiple-Input
Multiple-Output
(MIMO), Orthogonal
Frequency Division
Multiplexing (OFDM)
and Multiuser (MU)
MIMO
EVALUATION OF 5G NETWORK AND THE SECURITY
(CDMA)
3G In order to provide
medium access control,
code-division multiple
access (CDMA) is
considered
4G In order to provide
medium access control, it
combines multiple-input,
multiple-output (MIMO)
technology with
orthogonal frequency-
division multiplexing
(OFDM)
5G In order to provide
medium access control, it
combines technologies
Massive Multiple-Input
Multiple-Output
(MIMO), Orthogonal
Frequency Division
Multiplexing (OFDM)
and Multiuser (MU)
MIMO
8
EVALUATION OF 5G NETWORK AND THE SECURITY
speed of Network and utilization of
bandwidth [4]
1G The network speed in 1G
also known as data rate
ranges from 2.4 Kbps to
14.4 kbps
In order to provide
service in 1G narrow
band is considered which
is the following:
Bandwidth: Analog
telecommunication
(30KHz)
2G The network speed in 2G
or data rate is 64kbps and
this is the maximum data
speed that is provided by
the 2G network.
In order to provide
service in 2G, also
narrow band is
considered which is the
following:
Bandwidth: 900MHz
(25MHz)
EVALUATION OF 5G NETWORK AND THE SECURITY
speed of Network and utilization of
bandwidth [4]
1G The network speed in 1G
also known as data rate
ranges from 2.4 Kbps to
14.4 kbps
In order to provide
service in 1G narrow
band is considered which
is the following:
Bandwidth: Analog
telecommunication
(30KHz)
2G The network speed in 2G
or data rate is 64kbps and
this is the maximum data
speed that is provided by
the 2G network.
In order to provide
service in 2G, also
narrow band is
considered which is the
following:
Bandwidth: 900MHz
(25MHz)
9
EVALUATION OF 5G NETWORK AND THE SECURITY
3G The network speed in 3G
or data rate ranges from
144kbps – 2Mbps and
2Mbps is the maximum
data speed that is
provided by the 3G
network.
In order to provide
service in 3G, also wide
band is considered which
is the following:
Bandwidth: 100MHz
4G The network speed in 4G
or data rate ranges from
100Mbps – 1Gbps
Bandwidth: 900MHz
(25MHz)
5G The network speed in 5G
or data rate is minimum
1Gbps
Bandwidth: 100MHz
Security techniques and risk [5] 1G No such security
techniques deployed
EVALUATION OF 5G NETWORK AND THE SECURITY
3G The network speed in 3G
or data rate ranges from
144kbps – 2Mbps and
2Mbps is the maximum
data speed that is
provided by the 3G
network.
In order to provide
service in 3G, also wide
band is considered which
is the following:
Bandwidth: 100MHz
4G The network speed in 4G
or data rate ranges from
100Mbps – 1Gbps
Bandwidth: 900MHz
(25MHz)
5G The network speed in 5G
or data rate is minimum
1Gbps
Bandwidth: 100MHz
Security techniques and risk [5] 1G No such security
techniques deployed
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
EVALUATION OF 5G NETWORK AND THE SECURITY
2G Security features of
GSM, international
standard for 2G
technology include
authentication,
confidentiality and
anonymity.
For ensuring
authentication in GSM
A3 algorithm is used. For
encryption A5 algorithm
is used and for cipher,
key A8 algorithm is
considered.
Authentication of the
user is verified through
the random number or the
RAND that is sent to the
mobile SIM by the virtual
location register or the
VLR. Now the mobile
station sends the SRES
that is generated by the
SIM which VLR
compares with RAND.
EVALUATION OF 5G NETWORK AND THE SECURITY
2G Security features of
GSM, international
standard for 2G
technology include
authentication,
confidentiality and
anonymity.
For ensuring
authentication in GSM
A3 algorithm is used. For
encryption A5 algorithm
is used and for cipher,
key A8 algorithm is
considered.
Authentication of the
user is verified through
the random number or the
RAND that is sent to the
mobile SIM by the virtual
location register or the
VLR. Now the mobile
station sends the SRES
that is generated by the
SIM which VLR
compares with RAND.
11
EVALUATION OF 5G NETWORK AND THE SECURITY
The subscriber is verified
and authenticated only if
these two values are
same, otherwise the VLR
does not accept the
subscriber and the
subscriber is rejected.
3G In order to provide
security in 3G,
unauthorised
modification, insertion
and replay of messages is
restricted and also
consider the 128-bit
integrity key (IK) for
ensuring authentication.
Along with that, integrity
is also applied for
network layer that
consists the Radio
Resource Control (RRC)
for enhancing security
4G In 4G, security features
considered for the 2G and
3G is applied for 4G with
EVALUATION OF 5G NETWORK AND THE SECURITY
The subscriber is verified
and authenticated only if
these two values are
same, otherwise the VLR
does not accept the
subscriber and the
subscriber is rejected.
3G In order to provide
security in 3G,
unauthorised
modification, insertion
and replay of messages is
restricted and also
consider the 128-bit
integrity key (IK) for
ensuring authentication.
Along with that, integrity
is also applied for
network layer that
consists the Radio
Resource Control (RRC)
for enhancing security
4G In 4G, security features
considered for the 2G and
3G is applied for 4G with
12
EVALUATION OF 5G NETWORK AND THE SECURITY
some modifications. In
4G, for enhancing
security, range of
asymmetric encryption is
extended and signal
transfers are narrowed for
ensuring that hackers do
not easily get access to
those data.
5G The ERAP framework
that is deployed in the 5G
network, is not only
associated with the
primary authentication,
but also secondary
authentication as well.
This authentication
ensures that the privacy
of the users are not
affected due to false base
station. In 5G, the
architecture framework is
designed such that when
the initial protocol
message is sent, it limits
EVALUATION OF 5G NETWORK AND THE SECURITY
some modifications. In
4G, for enhancing
security, range of
asymmetric encryption is
extended and signal
transfers are narrowed for
ensuring that hackers do
not easily get access to
those data.
5G The ERAP framework
that is deployed in the 5G
network, is not only
associated with the
primary authentication,
but also secondary
authentication as well.
This authentication
ensures that the privacy
of the users are not
affected due to false base
station. In 5G, the
architecture framework is
designed such that when
the initial protocol
message is sent, it limits
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
EVALUATION OF 5G NETWORK AND THE SECURITY
the set of information that
is set as clear text and
therefore, it is not easy
for the hackers to identify
subscriber through
exploitation of protocol
message. Therefore, it
enhances the security of
the subscriber
EVALUATION OF 5G NETWORK AND THE SECURITY
the set of information that
is set as clear text and
therefore, it is not easy
for the hackers to identify
subscriber through
exploitation of protocol
message. Therefore, it
enhances the security of
the subscriber
14
EVALUATION OF 5G NETWORK AND THE SECURITY
5G Architecture:
Description of the architecture of a 5G network:
In
the
5G
architecture, the network is designed such that all of the random access networks or RANs
will consider same single Nanocore for communication [6]. RANs, which are supported by
the 5G architecture, are GSM, GPRS/EDGE, UMTS, LTE, LTE-advanced, WiMAX, WiFi,
CDMA2000, EV-DO, CDMA One, IS-95 etc. The 5G aggregator as described in the figure
aggregates the traffic from the RANs and it is located in BSC/RNC place. For each of the
RAT that are considered in the network design, different interfaces are provided by the 5G
mobile terminal for ensuring full access to the spectrum and wireless technologies as well for
ensuring that the application of the 5G technology is effective and efficient as well [7].
Identification and Analysis of 5G Attacks:
As already described that the 5G technology will revolutionize telecom industries and
therefore this is one of the most researched topic in telecom industries right now. Along with
that implementation of 5G technology will help to implement advance technology such as
IoT, augmented reality applications, driverless car and other smart and advanced technologies
EVALUATION OF 5G NETWORK AND THE SECURITY
5G Architecture:
Description of the architecture of a 5G network:
In
the
5G
architecture, the network is designed such that all of the random access networks or RANs
will consider same single Nanocore for communication [6]. RANs, which are supported by
the 5G architecture, are GSM, GPRS/EDGE, UMTS, LTE, LTE-advanced, WiMAX, WiFi,
CDMA2000, EV-DO, CDMA One, IS-95 etc. The 5G aggregator as described in the figure
aggregates the traffic from the RANs and it is located in BSC/RNC place. For each of the
RAT that are considered in the network design, different interfaces are provided by the 5G
mobile terminal for ensuring full access to the spectrum and wireless technologies as well for
ensuring that the application of the 5G technology is effective and efficient as well [7].
Identification and Analysis of 5G Attacks:
As already described that the 5G technology will revolutionize telecom industries and
therefore this is one of the most researched topic in telecom industries right now. Along with
that implementation of 5G technology will help to implement advance technology such as
IoT, augmented reality applications, driverless car and other smart and advanced technologies
15
EVALUATION OF 5G NETWORK AND THE SECURITY
due to its superior internet speed. However, these services will require vast amount of user
data and therefore ensuring security of the user data is one of the most important aspect of 5G
security [8]. Due to increase in volume of data followed by variety of information makes
these data easier to exploit.
Some of the threats of 5G network are the followings:
Access to personal information: the digital services such as IoT will surely enhance
consumer experience of digital applications, but it will collect personal data of the
consumer as well for providing services. However, due to less security infrastructure
of these IoT devices, it will be easier for the hackers for exploiting these data [3].
Surveillance: due to superior data speed, 5G will be considered for deploying mission
critical services and therefore, there is an increased risk for an attack, service outage,
or state-sponsored surveillance operation, which increases the security threats of the
5G applications.
Botnet: while 5G technology connects several devices, if one of the device is not
configured properly, it will compromise the security of other devices that are
connected to the network, which provides context for exploiting network security
through botnet, and therefore, it needs to be analysed properly for enhancing security
of the 5G network [5].
Solutions to security issues:
Integrating end to end encryption for enhancing data security
Virtual network slices are separated for restricting access to confidential data by other
companies or hackers
Designing and implementing security policy which restrict access to personal
information without permission of the owner of the information
EVALUATION OF 5G NETWORK AND THE SECURITY
due to its superior internet speed. However, these services will require vast amount of user
data and therefore ensuring security of the user data is one of the most important aspect of 5G
security [8]. Due to increase in volume of data followed by variety of information makes
these data easier to exploit.
Some of the threats of 5G network are the followings:
Access to personal information: the digital services such as IoT will surely enhance
consumer experience of digital applications, but it will collect personal data of the
consumer as well for providing services. However, due to less security infrastructure
of these IoT devices, it will be easier for the hackers for exploiting these data [3].
Surveillance: due to superior data speed, 5G will be considered for deploying mission
critical services and therefore, there is an increased risk for an attack, service outage,
or state-sponsored surveillance operation, which increases the security threats of the
5G applications.
Botnet: while 5G technology connects several devices, if one of the device is not
configured properly, it will compromise the security of other devices that are
connected to the network, which provides context for exploiting network security
through botnet, and therefore, it needs to be analysed properly for enhancing security
of the 5G network [5].
Solutions to security issues:
Integrating end to end encryption for enhancing data security
Virtual network slices are separated for restricting access to confidential data by other
companies or hackers
Designing and implementing security policy which restrict access to personal
information without permission of the owner of the information
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
EVALUATION OF 5G NETWORK AND THE SECURITY
Identification and Analysis of 5G limitation in network coverage:
In 3G network, cell tours were capable of covering a large territory and that too with fewer
cells and this was one of the main advantages of 3G technology [9]. Now in 4G as data speed
was increased, it increased the bandwidth as well for which the coverage area of the network
cells were decreased as well. Therefore, it decreased the network coverage as well. Now in
5G network bandwidth will be increased even further compared to the 4G technology for
supporting superior data speed. Therefore, in 5G technology although network bandwidth and
data speed will increases, the network coverage will decrease and this might be considered as
an important disadvantage as well if it is compared with the 3G and 4G technology [10].
Solution to the network coverage issue:
Researcher are analysing solutions that provides superior data speed without reducing the
bandwidth and according to the researchers it is not an easy solution to enhance data speed
while limiting the bandwidth for improving network coverage. Therefore, it needs proper
research for resolving this issue while proposing the appropriate model for that as well.
Conclusion:
5G technology as described by the experts are going to revolutionize the telecom industry
after it is launched worldwide for consumers and enterprises. One of the significant
improvement that 5G will bring and the feature that is most discussed among consumers is
enhancement of the network speed. Although 5G technology is advanced compared to other
technologies there are still security issues such as exploitation of privacy, illegal access to
network and data that is sent and received through the network, it is required to enhance the
security of the 5G network. In order to ensure security in 5G technology, new framework for
authentication is designed. It has deployed access authentication, which is also known as
primary authentication. This new framework supports deployment of extensible
EVALUATION OF 5G NETWORK AND THE SECURITY
Identification and Analysis of 5G limitation in network coverage:
In 3G network, cell tours were capable of covering a large territory and that too with fewer
cells and this was one of the main advantages of 3G technology [9]. Now in 4G as data speed
was increased, it increased the bandwidth as well for which the coverage area of the network
cells were decreased as well. Therefore, it decreased the network coverage as well. Now in
5G network bandwidth will be increased even further compared to the 4G technology for
supporting superior data speed. Therefore, in 5G technology although network bandwidth and
data speed will increases, the network coverage will decrease and this might be considered as
an important disadvantage as well if it is compared with the 3G and 4G technology [10].
Solution to the network coverage issue:
Researcher are analysing solutions that provides superior data speed without reducing the
bandwidth and according to the researchers it is not an easy solution to enhance data speed
while limiting the bandwidth for improving network coverage. Therefore, it needs proper
research for resolving this issue while proposing the appropriate model for that as well.
Conclusion:
5G technology as described by the experts are going to revolutionize the telecom industry
after it is launched worldwide for consumers and enterprises. One of the significant
improvement that 5G will bring and the feature that is most discussed among consumers is
enhancement of the network speed. Although 5G technology is advanced compared to other
technologies there are still security issues such as exploitation of privacy, illegal access to
network and data that is sent and received through the network, it is required to enhance the
security of the 5G network. In order to ensure security in 5G technology, new framework for
authentication is designed. It has deployed access authentication, which is also known as
primary authentication. This new framework supports deployment of extensible
17
EVALUATION OF 5G NETWORK AND THE SECURITY
authentication protocol (EAP) and this protocol is specified by the Internet Engineering Task
Force (IETF) organization. Along with that, there are limitation of network coverage as well
which needs to be analysed for ensuring that the application of the 5G technology is effective
and efficient as well.
EVALUATION OF 5G NETWORK AND THE SECURITY
authentication protocol (EAP) and this protocol is specified by the Internet Engineering Task
Force (IETF) organization. Along with that, there are limitation of network coverage as well
which needs to be analysed for ensuring that the application of the 5G technology is effective
and efficient as well.
18
EVALUATION OF 5G NETWORK AND THE SECURITY
References:
[1]"5G Technology Revolution", International Journal of Modern Trends in Engineering &
Research, vol. 4, no. 12, pp. 135-140, 2017. Available: 10.21884/ijmter.2017.4394.2tmix.
[2]"IEEE 5G Initiatives Special Issue on 5G Technologies and Applications", IEEE
Vehicular Technology Magazine, vol. 12, no. 4, pp. C2-C2, 2017. Available:
10.1109/mvt.2017.2753099.
[3]C. Grasso and G. Schembra, "5G-Hander: A network service for handover detection in 5G
networks", Internet Technology Letters, vol. 2, no. 4, p. e110, 2019. Available:
10.1002/itl2.110.
[4]"ADVANCED WIRELESS NETWORKS: VISION AND FUTURE OF 5G WIRELESS
MOBILE TECHNOLOGY", International Journal of Recent Trends in Engineering and
Research, vol. 4, no. 3, pp. 141-149, 2018. Available: 10.23883/ijrter.2018.4108.v9xyd.
[5]R. Molina-Masegosa and J. Gozalvez, "LTE-V for Sidelink 5G V2X Vehicular
Communications: A New 5G Technology for Short-Range Vehicle-to-Everything
Communications", IEEE Vehicular Technology Magazine, vol. 12, no. 4, pp. 30-39, 2017.
Available: 10.1109/mvt.2017.2752798.
[6]"Development of 5G Mobile Network Technology and Its Architecture", International
Journal of Recent Trends in Engineering and Research, vol. 3, no. 10, pp. 196-201, 2017.
Available: 10.23883/ijrter.2017.3475.vmof0.
[7]M. Cooper, "5G Technology Briefing", ITNOW, vol. 60, no. 3, pp. 16-20, 2018. Available:
10.1093/itnow/bwy062.
EVALUATION OF 5G NETWORK AND THE SECURITY
References:
[1]"5G Technology Revolution", International Journal of Modern Trends in Engineering &
Research, vol. 4, no. 12, pp. 135-140, 2017. Available: 10.21884/ijmter.2017.4394.2tmix.
[2]"IEEE 5G Initiatives Special Issue on 5G Technologies and Applications", IEEE
Vehicular Technology Magazine, vol. 12, no. 4, pp. C2-C2, 2017. Available:
10.1109/mvt.2017.2753099.
[3]C. Grasso and G. Schembra, "5G-Hander: A network service for handover detection in 5G
networks", Internet Technology Letters, vol. 2, no. 4, p. e110, 2019. Available:
10.1002/itl2.110.
[4]"ADVANCED WIRELESS NETWORKS: VISION AND FUTURE OF 5G WIRELESS
MOBILE TECHNOLOGY", International Journal of Recent Trends in Engineering and
Research, vol. 4, no. 3, pp. 141-149, 2018. Available: 10.23883/ijrter.2018.4108.v9xyd.
[5]R. Molina-Masegosa and J. Gozalvez, "LTE-V for Sidelink 5G V2X Vehicular
Communications: A New 5G Technology for Short-Range Vehicle-to-Everything
Communications", IEEE Vehicular Technology Magazine, vol. 12, no. 4, pp. 30-39, 2017.
Available: 10.1109/mvt.2017.2752798.
[6]"Development of 5G Mobile Network Technology and Its Architecture", International
Journal of Recent Trends in Engineering and Research, vol. 3, no. 10, pp. 196-201, 2017.
Available: 10.23883/ijrter.2017.3475.vmof0.
[7]M. Cooper, "5G Technology Briefing", ITNOW, vol. 60, no. 3, pp. 16-20, 2018. Available:
10.1093/itnow/bwy062.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
EVALUATION OF 5G NETWORK AND THE SECURITY
[8]P. Demestichas, A. Georgakopoulos, K. Tsagkaris and S. Kotrotsos, "Intelligent 5G
Networks: Managing 5G Wireless\/Mobile Broadband", IEEE Vehicular Technology
Magazine, vol. 10, no. 3, pp. 41-50, 2015. Available: 10.1109/mvt.2015.2446419.
[9]M. Sountharraj, "5g Mobile Technology", International Journal for Research in Applied
Science and Engineering Technology, vol. 6, no. 1, pp. 1699-1702, 2018. Available:
10.22214/ijraset.2018.1259.
[10]V. ., "5G TECHNOLOGY: A REVOLUTION IN MOBILE COMMUNICATION",
International Journal of Research in Engineering and Technology, vol. 05, no. 07, pp. 30-34,
2016. Available: 10.15623/ijret.2016.0507006.
EVALUATION OF 5G NETWORK AND THE SECURITY
[8]P. Demestichas, A. Georgakopoulos, K. Tsagkaris and S. Kotrotsos, "Intelligent 5G
Networks: Managing 5G Wireless\/Mobile Broadband", IEEE Vehicular Technology
Magazine, vol. 10, no. 3, pp. 41-50, 2015. Available: 10.1109/mvt.2015.2446419.
[9]M. Sountharraj, "5g Mobile Technology", International Journal for Research in Applied
Science and Engineering Technology, vol. 6, no. 1, pp. 1699-1702, 2018. Available:
10.22214/ijraset.2018.1259.
[10]V. ., "5G TECHNOLOGY: A REVOLUTION IN MOBILE COMMUNICATION",
International Journal of Research in Engineering and Technology, vol. 05, no. 07, pp. 30-34,
2016. Available: 10.15623/ijret.2016.0507006.
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.