Security and Privacy Preparation for 5G Services
نویسندگان
چکیده
5G is the new wireless technology. In vehicles, it used to support network associates for sensor on provide and roads V2X service drivers pedestrians. The (vehicle everything) communication a benefit us, low latency, high reliability large coverage. this novel, we survey how technology in autonomous vehicles. Mainly review architecture of 5G, its uses. And then discuss mobile evolution. also advantages vehicles design principles. This paper outlines Artificial Intelligence (AI). Finally, future generation, there predictable pay more attentions effort into developing services.
منابع مشابه
Security and Privacy for Location Based Services
In this paper we outline the security requirements for any infrastructure that facilitates secure location based services over the Internet. We describe an architecture that allows the provisioning of location based services, and consider security requirements for guaranteeing privacy to end users.
متن کاملPrivacy-preserving security solution for cloud services
We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient nonbilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven withou...
متن کاملLocation-based Services: Privacy, Security and Assurance
In a straight-forward setup, location-based services have many trust assumptions amongst the involved parties. However, some of the parties may be honest while still being interested in learning confidential information, and others can have reasons to cheat where possible. Therefore, system design needs to account for a less than perfect setting. Research in this area is currently focused on re...
متن کاملSecurity and Privacy for Web Databases and Services
A semantic web can be thought of as a web that is highly intelligent and sophisticated and one needs little or no human intervention to carry out tasks such as scheduling appointments, coordinating activities, searching for complex documents as well as integrating disparate databases and information systems. While much progress has been made toward developing such an intelligent web, there is s...
متن کاملSecurity for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in transdisciplinary engineering
سال: 2022
ISSN: ['2352-751X', '2352-7528']
DOI: https://doi.org/10.3233/atde220713