Reference Hub1
IoT-Enabled 5G Networks for Secure Communication

IoT-Enabled 5G Networks for Secure Communication

Sridevi, Tukkappa K. Gundoor
ISBN13: 9781668439210|ISBN10: 1668439212|ISBN13 Softcover: 9781668439227|EISBN13: 9781668439234
DOI: 10.4018/978-1-6684-3921-0.ch001
Cite Chapter Cite Chapter

MLA

Sridevi, and Tukkappa K. Gundoor. "IoT-Enabled 5G Networks for Secure Communication." Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks, edited by Biswa Mohan Sahoo and Suman Avdhesh Yadav, IGI Global, 2022, pp. 1-29. https://doi.org/10.4018/978-1-6684-3921-0.ch001

APA

Sridevi & Gundoor, T. K. (2022). IoT-Enabled 5G Networks for Secure Communication. In B. Sahoo & S. Yadav (Eds.), Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (pp. 1-29). IGI Global. https://doi.org/10.4018/978-1-6684-3921-0.ch001

Chicago

Sridevi, and Tukkappa K. Gundoor. "IoT-Enabled 5G Networks for Secure Communication." In Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks, edited by Biswa Mohan Sahoo and Suman Avdhesh Yadav, 1-29. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3921-0.ch001

Export Reference

Mendeley
Favorite

Abstract

Internet of things (IoT) meets 5G communications, which aims to use a variety of promising network technologies to support a significant number of connected devices. For cognitive computing, massive machine type of communication (mMTC), cloud computing, artificial intelligence (AI), and so on, huge challenges for security, privacy, and trust are predicted. Technologies for 5G wireless communication encourage its use of mobile networks not just to connect with people and machines but also to connect and manage other equipment that supports virtual reality, such as self-driving cars, IoT drones, surveillance, and security. It is also critical to safeguard the technology of the 5G networks for IoT communication from threats. The different models for 5G IoT communication environment, vulnerabilities, attacks, and its several security protocols are described. The current security mechanisms in 5G networks IoT nature were analyzed and compared. The security challenges and future orientations of 5G-based systems are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.