Essays about: "5G Security"
Showing result 1 - 5 of 25 essays containing the words 5G Security.
-
1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE
-
2. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE
-
3. The Digitalization of the Electricity System : Impact Assessment of Digital Technologies on the Electricity System and its Main Stakeholders
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This work explores the state of digitalization of the European electricity sector and assesses the impacts of digital technologies on the electricity system and its main stakeholders. Digital technologies, such as smart meters and 5G connectivity, represent a powerful tool for system operators to face the new challenges brought about by the decarbonization of the energy sector. READ MORE
-
4. Cell Tower Localization using crowdsourced measurments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis explores the application of a neural network approach to cell tower localization using crowdsourced measurements. The deployment of cell tower infrastructure has been increasing exponentially in recent times as it is a crucial element of mobile communications. READ MORE
-
5. Edge Computing Security for IoT : A Systematic Literature Review
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE