Abstract

Abstract5G is generally regarded as a major improvement over 4G in terms of data encryption and network consumer authentication. 5G would be a physical transformation of our critical networks, with long-term implications. According to experts, the weakness in 5G protection is likely to be the contact between internet-connected devices. Anything from vehicles and factory production lines to traffic lights with incorporated internet-connected sensors is part of the Internet of Things (IoT). Lower latency, improved bandwidth, and the capacity to restrict network slices to unique use cases, all of which are inherent in 5G design requirements, would allow a variety of new mobile and remote applications that were previously impossible to implement with 4G technology. The Internet of Things (IoT) is a company’s core driver for the next-generation (5G) mobile networks, which will support a slew of revolutionary IoT applications like smart cities, wearable sensors, and other numerous IoT use cases specified in 5G standards. Supervised learning technologies are incorporated in 5G-based narrowband IoT (NB-IoT) networks to effectively fight off computer security such as pervasive distributed denial of service (DDoS) assaults to fully unlock the secret potential of such expedition IoT applications on a broad scale in the 5G period.KeywordsIoT5GCyber securityDistributed Denial of Service (DDoS) attacksMalware information and sharing platformCrowd sourcingService providerDigital witnessingAdvanced metering infrastructureSupervisory monitoring and data acquisitionDevice attackData attackPrivacy attackNetwork attackAccess controlAuthenticationEncryptionIntrusion detection system

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call