The fifth-generation technology standard for mobile networks (5G) introduced a massive increase in capability due to the increased use of Internet of Things devices. However, implementing additional untrusted technology, such as IoT devices, exposes the infrastructure to unsecure hardware and software. As a result, the attack surface of the 5G mobile network has increased after transitioning from LTE to the 5G standard. Three research questions and hypotheses were composed to evaluate the architectural design of the network for the healthcare use case. The Perimeter Security, Zero Trust
The fifth-generation technology standard for mobile networks (5G) introduced a massive increase in capability due to the increased use of Internet of Things devices. However, implementing additional untrusted technology, such as IoT devices, exposes the infrastructure to unsecure hardware and software. As a result, the attack surface of the 5G mobile network has increased after transitioning from LTE to the 5G standard. Three research questions and hypotheses were composed to evaluate the architectural design of the network for the healthcare use case. The Perimeter Security, Zero Trust
Architecture-Based 5G Security Simulation
100
Architecture-Based 5G Security Simulation
100Paperback
Product Details
| ISBN-13: | 9783852239330 |
|---|---|
| Publisher: | Taj Associations |
| Publication date: | 09/29/2025 |
| Pages: | 100 |
| Product dimensions: | 6.00(w) x 9.00(h) x 0.21(d) |