Architecture-Based 5G Security Simulation

The fifth-generation technology standard for mobile networks (5G) introduced a massive increase in capability due to the increased use of Internet of Things devices. However, implementing additional untrusted technology, such as IoT devices, exposes the infrastructure to unsecure hardware and software. As a result, the attack surface of the 5G mobile network has increased after transitioning from LTE to the 5G standard. Three research questions and hypotheses were composed to evaluate the architectural design of the network for the healthcare use case. The Perimeter Security, Zero Trust

1148433059
Architecture-Based 5G Security Simulation

The fifth-generation technology standard for mobile networks (5G) introduced a massive increase in capability due to the increased use of Internet of Things devices. However, implementing additional untrusted technology, such as IoT devices, exposes the infrastructure to unsecure hardware and software. As a result, the attack surface of the 5G mobile network has increased after transitioning from LTE to the 5G standard. Three research questions and hypotheses were composed to evaluate the architectural design of the network for the healthcare use case. The Perimeter Security, Zero Trust

27.0 In Stock
Architecture-Based 5G Security Simulation

Architecture-Based 5G Security Simulation

by William S Patel
Architecture-Based 5G Security Simulation

Architecture-Based 5G Security Simulation

by William S Patel

Paperback

$27.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

The fifth-generation technology standard for mobile networks (5G) introduced a massive increase in capability due to the increased use of Internet of Things devices. However, implementing additional untrusted technology, such as IoT devices, exposes the infrastructure to unsecure hardware and software. As a result, the attack surface of the 5G mobile network has increased after transitioning from LTE to the 5G standard. Three research questions and hypotheses were composed to evaluate the architectural design of the network for the healthcare use case. The Perimeter Security, Zero Trust


Product Details

ISBN-13: 9783852239330
Publisher: Taj Associations
Publication date: 09/29/2025
Pages: 100
Product dimensions: 6.00(w) x 9.00(h) x 0.21(d)
From the B&N Reads Blog

Customer Reviews