ABSTRACT

This chapter introduces the most preliminary definitions of the Internet of Things (IoT), fifth generation (5G), cloud computing and edge paradigms, including their evolutions, use cases, importance, and standardization efforts, how they can cooperate with each other and change the technology. It presents security issues that affect the 5G-enabled IoT, especially for the edge paradigms and concludes with the different issues that target the 5G-enabled IoT and discusses the requirements and challenges of security mechanisms. The chapter illustrates the privacy threats in the 5G-enabled IoT and also discusses the state of the art regarding privacy issues. It explores the challenges and opportunities in the 5G-enabled IoT environment and the potential research interests. Efficiency and privacy authentication schemes are needed in the 5G-enabled IoT environment. Ahmed Hammam et al. employed a trust management system to calculate the trust value for the node in the mobile ad hoc clouds environment.