Research Article
Study on Security and Privacy in 5G-Enabled Applications
Table 2
The security and privacy risks of typical applications.
| Typical applications | Specific use cases | Risks examples |
| Smart manufacturing | AR assistance, VR complex assembly | Counterfeit terminals and failure of monitoring means | Collecting sensor data of IoT device | Data tampering and data eavesdropping | Remote control of engineering equipment | DDoS attacks and remote control |
| Smart traffic | Connected vehicles | DDoS attacks and data security risks | Passenger behavior safety analysis | Failure of monitoring means |
| Smart grids | Distribution network differential protection and precise load control | DDoS attacks | Customized network slice to satisfy the low time latency requirement | Counterfeit terminals and management of network slices |
| Smart campus | Distance learning and AR content dissemination | Failure of monitoring means and user privacy leakage | Front-projected holographic display | Failure of monitoring means and user privacy leakage |
|
|
|