
Wireless communication systems have been at risk of security attacks right from the very beginning. The first-generation wireless networks saw mobile phones and wireless channels as targets for illegal cloning and masquerading. The second generation of wireless networks was characterized by message spamming that became common not only for pervasive attacks but also injecting false information or broadcasting unwanted marketing information.Almost every security threat in 5G networks uses LTE weaknesses as a loophole. Some of them are illegal data consumption, target-type network device denial of service (DoS), information leaks, and audio eavesdropping. The various schemes to improve security of 5G network is proposed in the previous years. In this paper, various many techniques are analysed which in terms of certain parameters which can improve security of 5 G network.
Security Analysis, 5G, LTS, Software defined networks
Security Analysis, 5G, LTS, Software defined networks
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
