he explosive growth in mobile data traffic, combined with the proliferation of“ smart” devices,
Tis forcing communications systems providers to |
enabler for continuity of the business. Users already realize that security and privacy are important, and they could be aware of the security / privacy service provided to |
transform their networks. Although much of this |
them. It is believed that the extent and strength of the |
transformation to date has been tactical in its approach, |
security mechanisms provided correlate with the |
future demands in the network will require new network |
perceived security level, at least in the long run. Perception |
architectures that support an increasingly diverse set of |
is closely related to trust, hence negative changes may |
services, user applications and resource requirements. |
happen very quickly( e. g. because of front-page news |
As vertical industries are thriving— Vehicle Network, |
about observed attacks). |
Internet of Things( IoT), AR / VR, and high speed railways, |
In the 5G context, users may already have some perception |
just to name a few— they all demand fast yet ubiquitous |
of provided security level based on experience with earlier |
network access to gain a new momentum. The rise of new |
generations. To provide continuity of perceived security, it |
business, new architecture, and new technologies in 5G |
is important that security and privacy features that exist in |
will present new challenges to security and privacy |
earlier generations are also present in 5G, although the |
protection. |
actual technical security mechanisms may be different. |