P. Joseph Joshua Giftson
FIFTH Generation (5G) mobile communication technologies are on the way to be adopted all over the world as the next mobile network. Hence it is important to analyze its impact on the landscape of computing and data management. The increase in low-cost devices and access points with increased mobility and heterogeneity leads to the extremely complex and dynamic environment of 5G-and beyond wireless networks. Specifically, due to the open broadcast nature of radio signal propagation, widely adopted standardized transmission protocols, and intermittent communication characteristic, wireless communications are extremely vulnerable to interception and spoofing attacks. A large number of databases are shared in 5G technology and hence we face challenges regarding security and privacy. Here, we discuss some authentication approaches based on machine learning techniques for the 5G wireless network.
5G wireless network, Artificial Intelligence, network slicing, Internet of Things, Machine Learning, data privacy, security management