Survey of security Issue in 5G security
Author(s):
Mukul biswas, Keshav Kishore
Keywords:
5G Cybersecurity, Wireless network, Network security, Attack vectors, Mitigations.
Abstract
Mobile networks are prime target for cyberattacks as they serve as backbone for digital commmunictaion. Smartphones becomes universal device to access the data, connectivity and information. Security is always a significant issue that should be tended to in a time where user and administrator are putting preventive measures against digital wrongdoing that incorporates refusal of cyber assaults, altering data, and information misleading, listening in sensitive communication, among others. These attacks leads to confidential data will be downloaded, transferred and handled through the impending 5G networks. Besides, the development of the 5G time requires the incorporation of numerous current trend setting innovations with creative new methods, which will bring about numerous new security breaches. Accordingly, in this paper, we present instances of possible dangers and attack vectors against the principle parts of 5G to reveal insight into the future security issues and difficulties in the impending 5G period. We will study and list the most common attacks and their possible mitigations.
Article Details
Unique Paper ID: 155462

Publication Volume & Issue: Volume 9, Issue 1

Page(s): 806 - 809
Article Preview & Download


Share This Article

Conference Alert

NCSST-2021

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2021

Go To Issue



Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies