Presentation + Paper
30 April 2019 Exploring the security and operational aspects of the 5th generation wireless communication system
B. S. Farroha, D. L. Farroha, J. D. Cook, A. Dutta
Author Affiliations +
Abstract
The development and implementation of the next generation wireless technology has been a key industrial goal over the last decade where many pieces of infrastructure are being incrementally built and deployed. The dream of automated homes, driverless vehicles, automated air traffic control, and intelligent cybermedicine can all be implemented with 5G and Artificial Intelligence/Machine Learning (AI/ML). Once you add AI/ML to the proposed high bandwidth, high speed, low latency network, with ubiquitous connectivity, we get a platform that can enable many safety-critical automated functions. 5G can also provide connectivity to every potential device to ensure owner knowledge of status and alerts for potential malfunctions. All this data can become weaponized in the wrong hands, so as we create more data to make life better and safer, we create vulnerabilities that can leverage the speed, and capacity of the communication system to harm users. This paper addresses the potential vulnerabilities and mitigations of ubiquitously implementing 5G to ensure secure communications and data protection.
Conference Presentation
© (2019) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
B. S. Farroha, D. L. Farroha, J. D. Cook, and A. Dutta "Exploring the security and operational aspects of the 5th generation wireless communication system", Proc. SPIE 11015, Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2019, 1101508 (30 April 2019); https://doi.org/10.1117/12.2519245
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Telecommunications

Data communications

Clouds

Network architectures

Networks

Back to Top