2020
DOI: 10.1109/access.2020.3000662
|View full text |Cite
|
Sign up to set email alerts
|

GDPR Interference With Next Generation 5G and IoT Networks

Abstract: This article examines the specific data protection framework with regards to 5G networks, which is the current high-end evolution of the previous four generations of cellular technology networks [1]. Taking into consideration practical issues, that have emerged from 5G (Fifth Generation) technology, the scope is the presentation of legal solutions. As this digital mobile transformation will begin from 2020, affecting applications of a wide range of services in energy sector, transport services, banking sector,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Security monitoring approaches include both the detection of known attack patterns as well as the detection of anomalies. In typical civilian mobile networks, the possibilities of monitoring end-users is limited due to privacy regulation [104], however, in bubbles or slices dedicated for public safety users' opportunities to analyze end-user traffic to detect threats may be greater.…”
Section: Management Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…Security monitoring approaches include both the detection of known attack patterns as well as the detection of anomalies. In typical civilian mobile networks, the possibilities of monitoring end-users is limited due to privacy regulation [104], however, in bubbles or slices dedicated for public safety users' opportunities to analyze end-user traffic to detect threats may be greater.…”
Section: Management Domainmentioning
confidence: 99%
“…Second, privacy is not a similar issue, as private applications and personal communications are typically limited. Consequently, privacy regulations [104] that may limit monitoring in civilian networks may not be a problem in public safety communications. Third, the threat detection may in some cases be more accurate in homogeneous public safety networks as the used applications and protocols are known in advance and produce traffic patterns that repeat in every mission.…”
Section: A Tactical Security Situational Awareness and Orchestrationmentioning
confidence: 99%
“…As personal data, GDPR has considered all information that may be linked to a natural person. GDPR is considered "one of the strictest and most accurate privacy laws worldwide" [20], therefore it comprises of the main legislative ground for this work used as a reference point to estimate the impact of an attack. The Privacy and Electronic Communications Regulations (PECR), also known as ePrivacy directive, is complementary to the GDPR and focuses on the privacy of the data subject on electronic communications [8].…”
Section: E Legislation and Directives In Telecommunicationsmentioning
confidence: 99%
“…In 5G the user's permanent identity is recommended to be concealed while temporary identifier should be refreshed after each usage. Furthermore, the specifications suggest that both user and signaling data are encrypted and integrity protected to ensure personal data from accidental, unauthorized or unlawful access, use, modification, disclosure, loss, destruction or damage (EU GDPR Article 5) [20]. Previous generations did not focus neither on the concealment of the user permanent identity nor on the frequent update of the temporary identity, while the user data were not integrity protected.…”
Section: E Legislation and Directives In Telecommunicationsmentioning
confidence: 99%
“…With the rapid development of wireless communication, there are tighter requirements such as throughput, spectrum utilization, very low latency, and massive device connectivity for the 5G system [1]- [3]. Due to the limitations of frequency-domain and time-domain resource elements (REs), the conventional orthogonal multiple access (OMA)based is hard to meet increasing application demands.…”
Section: Introductionmentioning
confidence: 99%