Why EAP Protocol is used in 5G Security?
November 9, 2021

The authentication procedure in 3GPP 5G security has been designed as a framework to support the Extensible Authentication Protocol (EAP) – a security protocol specified by the Internet Engineering Task Force (IETF) organization. This protocol is well established and widely used in IT environments. The advantage of this protocol is that it allows the use […]

5G Security Vs. 4G Security
July 18, 2021

5G Timeline and Standardization  During preparation, it was decided to split Phase 1 into two parts. In December 2017, standardization of the non-autonomous, or Non-Standalone, architecture for 5G New Radio (NR) was completed. This first official set of 5G standards defines the wireless air interface for interworking with existing LTE-based networks. This has allowed operators […]

The Evolution of Security in 5G
November 2, 2018

Introduction 5G will give a diverse and new set of services and use cases affecting nearly every aspect of our lives. But to exceed all expectations, 5G-enabled services and applications must be delivered securely. For example, 5G will support Massive Internet of Things (MIoT) implementations like traffic sensors and Vehicle-to-Infrastructure (V2I) services that are the […]