Foreword

5G cellular networks promise not only an enhancement of radio access technology but also to complete the trajectory to connecting billions of people and things, whether on motion or attached to an infrastructure. By reducing the cost and efforts to connect people and things, it will not only help accelerate economic growth across various industries and the public sector, but will also provide a platform based on cloud computing and IoT (Internet of Things) for many critical infrastructures that offer important utility, transportation and public safety services. It is currently, and will be for the next decade, the prime focus of research and development activities across multiple countries and continents, and the outcome sought will go beyond basic user connectivity services, also addressing opportunities to simplify networks and the deployment of new services.

As 5G networks become pervasive and foundational components of personal, public and enterprise systems, possibly replacing dedicated and isolated networks. Maintaining the confidentiality, integrity and availability of these networks will be among the key design and implementation challenges. Universal connectivity is attractive to both the intended beneficiaries of these networks likewise to the bad actors. They can wreak havoc from afar, across different industries and causing financial, privacy, safety and national security harms.

This book is one of the first attempts to comprehensively address the key security ...

Get A Comprehensive Guide to 5G Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.