{"title":"Building Privacy First 5G Networks","authors":"V. Viswanathan, Karthik Andhiyur Nagarajan","doi":"10.1109/CONECCT55679.2022.9865760","DOIUrl":null,"url":null,"abstract":"The true potential of 5G comes from the ability to link thousands of devices—like security cameras, traffic sensors, and other surveillance gadgets. 5G networks expose personal data to a remarkably high degree of privacy risk. This whitepaper recommends a privacy-first strategy coupled with innovative privacy technologies for new business models and solutions to mitigate the risks created by advances in communication technology and effectively build trust and privacy for end consumers, employees, and partners.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONECCT55679.2022.9865760","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The true potential of 5G comes from the ability to link thousands of devices—like security cameras, traffic sensors, and other surveillance gadgets. 5G networks expose personal data to a remarkably high degree of privacy risk. This whitepaper recommends a privacy-first strategy coupled with innovative privacy technologies for new business models and solutions to mitigate the risks created by advances in communication technology and effectively build trust and privacy for end consumers, employees, and partners.