Abstract

5G is not only a new generation of mobile communication generations, but it is a revolutionary technology that supports previous applications and enables new ones because of its great benefits such as high data rate, low latency, massive connectivity, and network reliability. However, the huge number of connected devices, the enablers technologies, reliance on virtualization and cloud services will lead to many new threats besides the old threats and attacks. Consequently, there is a serious need to find out these threats and check appropriate countermeasures, that ensure a robust and secure communication system. In this paper, we provide a brief review of 5G architecture and related security vulnerabilities that can be monitored and detected in a Security Operation Center.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call