Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy
Abstract
With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...
Read More
With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the fifth Generation and existing proposed plans are centred on the security model of this study, with authentication, availability, confidentiality, integrity, visibility, and centralized security policy. However, initiating innovative technologies and enhanced aspects in the 5th Generation communication raises new requirements and has given various security challenges. 5G-based applications face security risks because of using modern technology. This paper presents a study of security attacks and the security risks faced by 5G intelligent applications. This research article also investigates the three main 5G usage scenarios (i.e., eMBB, uRLLC, and mMTC). This research recommends the steps to be taken to reduce the security risks of 5G usage scenarios & intelligent applications.