Cyber-security and performance Issues in 4G LTE network
Jaramogi Oginga Odinga University of Science and Technology, 40601, Bondo.
Review
World Journal of Advanced Engineering Technology and Sciences, 2024, 12(02), 622–662.
Article DOI: 10.30574/wjaets.2024.12.2.0328
Publication history:
Received on 01 June 2024; revised on 03 August 2024; accepted on 06 August 2024
Abstract:
The 4G LTE (Long Term Evolution) network represents a substantial challenge in wireless communication technology, providing slightly improved data transfer rates, decreased response time, and heightened connectedness from the 3G network. Nevertheless, there are significant worries surrounding the cybersecurity of these sophisticated network. The convergence of people, procedures, and technology to defend business, persons, or networks against digital attacks is known as cybersecurity. Cybersecurity is essential to protect organizational assets from risks such as but not limited to personal data breaches, unauthorized access leading to reputational and financial impact (Sandhu 2021). Previously isolated systems are now interconnected and sharing data. (Möller 2023) states that this connectedness also poses some inconveniences as well, whenever a device joins the Internet, it becomes publicly discovered. Once these devices are discovered, they become open to cyberattacks (Singh & Kumar, 2020 and Aphane, 2023). Cybersecurity has become an essential part of our daily lives due to the increasing frequency and severity of cyberattacks. Cybersecurity consultants face a significant challenge in measuring the effectiveness of cybersecurity measures in organizations in terms of performance in the 4G LTE networks. Another challenge could be finding a cybersecurity architecture that is effective and can fit different situations (Mbelli and Dwolatzky, 2016; Carcary, Doherty & Conway, 2019). The main aim of this study was to look on cybersecurity and performance issues on the 4G LTE networks, develop a comprehensive cybersecurity architecture that can be used by cybersecurity consultants when measuring cybersecurity effectiveness, performances and the solutions in security, privacy and performance. The following section will provide a brief overview of cybersecurity architectures, then followed by the research methodology utilised in this study. The proposed cybersecurity architecture presented and followed by the research methodology, summary of the results and implications of the study.
Keywords:
4G Network; Cybersecurity; Performance
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0