he explosive growth in mobile data traffic , combined with the proliferation of “ smart ” devices ,
Tis forcing communications systems providers to |
enabler for continuity of the business . Users already realize that security and privacy are important , and they could be aware of the security / privacy service provided to |
transform their networks . Although much of this |
them . It is believed that the extent and strength of the |
transformation to date has been tactical in its approach , |
security mechanisms provided correlate with the |
future demands in the network will require new network |
perceived security level , at least in the long run . Perception |
architectures that support an increasingly diverse set of |
is closely related to trust , hence negative changes may |
services , user applications and resource requirements . |
happen very quickly ( e . g . because of front-page news |
As vertical industries are thriving — Vehicle Network , |
about observed attacks ). |
Internet of Things ( IoT ), AR / VR , and high speed railways , |
In the 5G context , users may already have some perception |
just to name a few — they all demand fast yet ubiquitous |
of provided security level based on experience with earlier |
network access to gain a new momentum . The rise of new |
generations . To provide continuity of perceived security , it |
business , new architecture , and new technologies in 5G |
is important that security and privacy features that exist in |
will present new challenges to security and privacy |
earlier generations are also present in 5G , although the |
protection . |
actual technical security mechanisms may be different . |