Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Research on 4G And 5G Authentication Signaling
by
Song, Lei
, Zhi, Ruxin
, Tian, Zhigang
, Chen, Jinhui
, Xu, Zhan
in
4G mobile communication
/ 5G mobile communication
/ Authentication
/ Standardization
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Research on 4G And 5G Authentication Signaling
by
Song, Lei
, Zhi, Ruxin
, Tian, Zhigang
, Chen, Jinhui
, Xu, Zhan
in
4G mobile communication
/ 5G mobile communication
/ Authentication
/ Standardization
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Research on 4G And 5G Authentication Signaling
2019
Request Book From Autostore
and Choose the Collection Method
Overview
In recent years, the development and standardization of 5G networks have received extensive attention. 3GPP officially confirmed that Service-Based Architecture (SBA) is the unified infrastructure of the 5G core network (5GC). The Service-Based Interface (SBI) is an important part of the SBA for interaction between network function services within the 5GC. The fifth generation mobile network will support a range of use cases and requirements that are completely different from traditional 4G networks, such as providing a high level of authentication mechanisms. This paper is organized as follows: First, we compare the difference between 4G authentication and 5G authentication in three aspects including the 4G architecture, authentication process, and communication protocol stack, then implement the simulation environment, and finally evaluate the performance by comparing the delay.
Publisher
IOP Publishing
This website uses cookies to ensure you get the best experience on our website.