Paper
Document
Download
Flag content
0

Secure Communication Protocols for Enhancing Privacy in 5G Mobile Networks

Save
TipTip
Document
Download
Flag content
0
TipTip
Save
Document
Download
Flag content

Abstract

The 5G mobile network is innovative in providing low-latency conversation services. However, this new era brings massive issues around privacy and safety. With the boom in linked and Internet of Things (IoT) gadgets, the danger of touchy information being accessed through unauthorized activities will increase. Cozy communication protocols are essential to decorating privacy in 5G mobile networks. The protocols use advanced encryption and authentication techniques to protect records transmitted over the net. Further, they deploy at-ease channels among devices to prevent interception and manipulation of the use of malicious actors. One of the number one protocols for securing conversation in 5G networks is the 5G Authentication and Key settlement. This protocol employs mutual authentication and a significant era of the equipment and the network, ensuring that the handiest prison devices can accurately enter the network and that the transmitted records are encrypted and protected.

Paper PDF

This paper's license is marked as closed access or non-commercial and cannot be viewed on ResearchHub. Visit the paper's external site.