Abstract

The 5th Generation Mobile Technology will provide broadband internet access anywhere enabling users to connect with multiple devices on the go with Internet of Things (IoT). Technological enablers such as fog and cloud computing with Software defined Networking and Network function Virtualization. With the evolution from 4G to 5G there are many security challenges to be investigated for growing demands of user privacy. In this paper we provide an overview of different cryptographic attacks that can take place inside a 5G mobile network. Furthermore, we present the countermeasures for all the possible attacks and analyze future security challenges.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.