{"title":"4G和5G对PS的问题和挑战","authors":"A. Yarali","doi":"10.1002/9781119580157.ch11","DOIUrl":null,"url":null,"abstract":"Numerous public safety policies and organizations have been implemented to secure wireless connection, but there is still a vast gap to cover. This chapter looks at various issues regarding fourth generation (4G) and fifth generation (5G) network connections, their challenges, and various recommendations to mitigate the problems. Through various presentations and results from multiple experiments done by different stakeholders in the communication sector, it has been proven that 5G will be stronger and more efficient than 4G network connections. Threats that are related to 4G and 5G cellular networks can be put into various categories. Such categories cover both the internal and external component of any networking environment. Threats against privacy are widespread in society. Threats against integrity have also been pervasive among various institutions. Attacks against authentication are an excellent example of an internal networking breach, which is also very common among users using the 4G services and previous forms of cellular networks.","PeriodicalId":447814,"journal":{"name":"Public Safety Networks from LTE to 5G","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Issues and Challenges of\\n 4G\\n and\\n 5G\\n for\\n PS\",\"authors\":\"A. Yarali\",\"doi\":\"10.1002/9781119580157.ch11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Numerous public safety policies and organizations have been implemented to secure wireless connection, but there is still a vast gap to cover. This chapter looks at various issues regarding fourth generation (4G) and fifth generation (5G) network connections, their challenges, and various recommendations to mitigate the problems. Through various presentations and results from multiple experiments done by different stakeholders in the communication sector, it has been proven that 5G will be stronger and more efficient than 4G network connections. Threats that are related to 4G and 5G cellular networks can be put into various categories. Such categories cover both the internal and external component of any networking environment. Threats against privacy are widespread in society. Threats against integrity have also been pervasive among various institutions. Attacks against authentication are an excellent example of an internal networking breach, which is also very common among users using the 4G services and previous forms of cellular networks.\",\"PeriodicalId\":447814,\"journal\":{\"name\":\"Public Safety Networks from LTE to 5G\",\"volume\":\"2014 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Public Safety Networks from LTE to 5G\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/9781119580157.ch11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Public Safety Networks from LTE to 5G","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781119580157.ch11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Numerous public safety policies and organizations have been implemented to secure wireless connection, but there is still a vast gap to cover. This chapter looks at various issues regarding fourth generation (4G) and fifth generation (5G) network connections, their challenges, and various recommendations to mitigate the problems. Through various presentations and results from multiple experiments done by different stakeholders in the communication sector, it has been proven that 5G will be stronger and more efficient than 4G network connections. Threats that are related to 4G and 5G cellular networks can be put into various categories. Such categories cover both the internal and external component of any networking environment. Threats against privacy are widespread in society. Threats against integrity have also been pervasive among various institutions. Attacks against authentication are an excellent example of an internal networking breach, which is also very common among users using the 4G services and previous forms of cellular networks.