Abstract
5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning system in its part will also be the leading navigation system, once the 5G mobile network potentials are fully deployed and accessible everywhere and by every user and device. However, 5G technology needs firstly to be cyber secured, before its benefits and capabilities can be totally explored and reached. Almost the majority of cyber security experts agree that the 5G technology is vulnerable to various threats, i.e., the high risk that it brings regarding cyber hacking and data theft due to the absence of suitable access control and data encryption during the communication process between the user-end devices and the 5G mobile network. In order to securely benefit from the full potential and capabilities of 5G network, there is a huge demand to protect the 5G technologies through ensuring the trust factor regarding the access to the 5G mobile network, in order to achieve a secure 5G positioning system from start to end. This review paper introduces the background of 5G and how to secure the 5G positioning system by implementing zero-trust network access on top of the 5G mobile network combined with the network overlay virtualization.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the First International Conference on Artificial Intelligence Security and Privacy |
| Volume | 14509 |
| Publisher | Springer |
| Publication date | 2024 |
| Pages | 563-578 |
| DOIs | |
| Publication status | Published - 2024 |
| Event | First International Conference on Artificial Intelligence Security and Privacy - Guangzhou, China Duration: 3 Dec 2024 → 5 Dec 2024 Conference number: 1 |
Conference
| Conference | First International Conference on Artificial Intelligence Security and Privacy |
|---|---|
| Number | 1 |
| Country/Territory | China |
| City | Guangzhou |
| Period | 03/12/2024 → 05/12/2024 |
Keywords
- 5G Positioning
- Cyber Security
- Overlay Network
- Trust Management
- Zero Trust