A systemetic Review on Security, Strength and Core of 5G

Authors

  • Anju V. Kulkarni Department of Electronics and Telecommunication Engineering, Dayananda Sagar College of Engineering,Bangalore India
  • Smitha Sasi Department of Electronics and Telecommunication Engineering, Dayananda Sagar College of Engineering,Bangalore India
  • Radhika Menon Department of Mathematics,Dr D.Y.Patil Institute of Engineering and Technology,Pimpri,Pune,India
  • Mithra Venkatesan Department of AI and Data Science,Dr D.Y.Patil Institute of Engineering and Technology,Pimpri,Pune,India

Keywords:

5G, Security, Networks security, Privacy, Security challenges, IoT

Abstract

The creation of next-generation wireless networks is projected to provide rapid connectivity and low-latency connections in daily life. As a result, network security is essential. The increase in gadgets and the range of facilities that 5G provides  have made the environment for network security more difficult. This is exactly it's so important to go to work on workable security solutions right away. The findings of our analysis have demonstrated the several ways that modern wireless network growth will take. Artificial intelligence and software-defined mobile networks are two of them.

Downloads

Download data is not yet available.

References

Yazdinejad, A. Dehghantanha, H. Karimipour, G. Srivastava, and R. M. Parizi, “An efficient packet parser architecture for software-defined 5g networks,” Physical Communication, vol. 53, p. 101677, 2022.

D. Fang, Y. Qian, and R. Q. Hu, “Security for 5g mobile wireless networks,” IEEE Access, vol. 6, pp. 4850–4874, 2017.

N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5g: The next generation of mobile communication,” Physical Communication, vol. 18, pp. 64–84, 2016.

M. Agiwal, A. Roy, and N. Saxena, “Next generation 5g wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1617–1655, 2016.

M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, and M. Ylianttila, A comprehensive guide to 5G security. Wiley Online Library, 2018.

J. Zhang, W. Xie, and F. Yang, “An architecture for 5g mobile network based on sdn and nfv,” 2015.

P. Schneider and G. Horn, “Towards 5g security,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1. IEEE, 2015, pp. 1165–1170.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “Blockchain-enabled authentication handover with efficient privacy protection in sdn-based 5g networks,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1120–1132, 2019.

Q. Tang, O. Ermis, C. D. Nguyen, A. De Oliveira, and A. Hirtzig, “A systematic analysis of 5g networks with a focus on 5g core security,” IEEE Access, vol. 10, pp. 18 298–18 319, 2022.

R. Dangi, P. Lalwani, G. Choudhary, I. You, and G. Pau, “Study and investigation on 5g technology: A systematic review,” Sensors, vol. 22, no. 1, p. 26, 2021.

M. Montano-Blacio, J. Brice ˜ no-Sarmiento, and F. Pes ˜ antez-Bravo, ´ “5g network security for iot implementation: A systematic literature review,” in International Conference on Innovation and Research. Springer, 2020, pp. 28–40.

Y. Perwej, S. Q. Abbas, J. P. Dixit, N. Akhtar, and A. K. Jaiswal, “A systematic literature review on the cyber security,” International Journal of scientific research and management, vol. 9, no. 12, pp. 669– 710, 2021.

R. Sethi, A. Kadam, K. Prabhu, and N. Kota, “Security considerations to enable time-sensitive networking over 5g,” IEEE Open Journal of Vehicular Technology, vol. 3, pp. 399–407, 2022.

[14] C. Wohlin, “Guidelines for snowballing in systematic literature studies and a replication in software engineering,” in Proceedings of the 18th international conference on evaluation and assessment in software engineering, 2014, pp. 1–10.

A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking,” Computers & Security, vol. 88, p. 101629, 2020.

P. V. Torres-Carrion, C. S. Gonz ´ alez-Gonz ´ alez, S. Aciar, and ´ G. Rodr´ıguez-Morales, “Methodology for systematic literature review applied to engineering and education,” in 2018 IEEE Global engineering education conference (EDUCON). IEEE, 2018, pp. 1364– 1373.

B. Kitchenham, S. Charters et al., “Guidelines for performing systematic literature reviews in software engineering version 2.3,” Engineering, vol. 45, no. 4ve, p. 1051, 2007.

A. Dutta and E. Hammad, “5g security challenges and opportunities: a system approach,” in 2020 IEEE 3rd 5G World Forum (5GWF). IEEE, 2020, pp. 109–114.

R. Borgaonkar, I. Anne Tøndel, M. Zenebe Degefa, and M. Gilje Jaatun, “Improving smart grid security through 5g enabled iot and edge computing,” Concurrency and Computation: Practice and Experience, vol. 33, no. 18, p. e6466, 2021.

D. Segura, J. Munilla, E. J. Khatib, and R. Barco, “5g early data transmission (rel-16): Security review and open issues,” IEEE Access, vol. 10, pp. 93 289–93 308, 2022.

H. Sama, S. Adam, H. Bissa, D. Lamboni, M. Akpanahe, K. Tomta, ` M. Djibril, and M. Gunepin, “Complexite de la cha ´ ˆıne de soutien medical op ´ erationnel au cours d’une mission des nations unies ´ en afrique subsaharienne. a propos d’un cas,” ` M´edecine Intensive R´eanimation, vol. 26, no. 6, pp. 528–534, 2017. [22] Q. Qiu, S. Liu, S. Xu, and S. Yu, “Study on security and privacy in 5g-enabled applications,” Wireless Communications and Mobile Computing, vol. 2020, 2020. [23] H. Sama, S. Adam, H. Bissa, D. Lamboni, M. Akpanahe, K. Tomta, ` M. Djibril, and M. Gunepin, “Complexite de la cha ´ ˆıne de soutien medical op ´ erationnel au cours d’une mission des nations unies ´ en afrique subsaharienne. a propos d’un cas,” ` M´edecine Intensive R´eanimation, vol. 26, no. 6, pp. 528–534, 2017.

“The human central nervous system, 4th ed.” May 2008. [Online]. Available: http://www.ajnr.org/content/29/5/e39 [25] E. Zeydan, O. Dedeoglu, and Y. Turk, “Performance monitoring and evaluation of fttx networks for 5g backhauling,” Telecommunication Systems, vol. 77, no. 2, pp. 399–412, 2021.

M. T. Raliile and T. C. Haupt, “Application of artificial intelligence for construction workers wellbeing in south africa,” in Construction in 5D: Deconstruction, Digitalization, Disruption, Disaster, Development. Springer, 2023, pp. 125–135.

T. Mohammed, A. Albeshri, I. Katib, and R. Mehmood, “Ubipriseq—deep reinforcement learning to manage privacy, security, energy, and qos in 5g iot hetnets,” Applied Sciences, vol. 10, no. 20, p. 7120, 2020.

M. Geller and P. Nair, “5g security innovation with cisco,” Whitepaper Cisco Public, pp. 1–29, 2018.

Y.-B. Lin, T.-J. Huang, and S.-C. Tsai, “Enhancing 5g/iot transport security through content permutation,” IEEE Access, vol. 7, pp. 94 293–94 299, 2019.

K. F. Jasim, K. Z. Ghafoor, and H. S. Maghdid, “Analysis of encryption algorithms proposed for data security in 4g and 5g generations,” in ITM Web of Conferences, vol. 42. EDP Sciences, 2022, p. 01004.

R. F. Olimid and G. Nencioni, “5g network slicing: A security overview,” IEEE Access, vol. 8, pp. 99 999–100 009, 2020.

R. Sethi, A. Kadam, K. Prabhu, and N. Kota, “Security considerations to enable time-sensitive networking over 5g,” IEEE Open Journal of Vehicular Technology, vol. 3, pp. 399–407, 2022.

X. Zhang, A. Kunz, and S. Schroder, “Overview of 5g security in ¨ 3gpp,” in 2017 IEEE conference on standards for communications and networking (CSCN). IEEE, 2017, pp. 181–186.

Q. Qiu, S. Liu, S. Xu, and S. Yu, “Study on security and privacy in 5g-enabled applications,” Wireless Communications and Mobile Computing, vol. 2020, 2020. [35] A. Afaq, N. Haider, M. Z. Baig, K. S. Khan, M. Imran, and I. Razzak, “Machine learning for 5g security: Architecture, recent advances, and challenges,” Ad Hoc Networks, vol. 123, p. 102667, 2021.

X. Ji, K. Huang, L. Jin, H. Tang, C. Liu, Z. Zhong, W. You, X. Xu, H. Zhao, J. Wu et al., “Overview of 5g security technology,” Science China Information Sciences, vol. 61, no. 8, pp. 1–25, 2018.

S. Kwon, S. Park, H. Cho, Y. Park, D. Kim, and K. Yim, “Towards 5g-based iot security analysis against vo5g eavesdropping,” Computing, vol. 103, no. 3, pp. 425–447, 2021.

J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li, and H. Wang, “Is today’s end-to-end communication security enough for 5g and its beyond?” IEEE Network, vol. 36, no. 1, pp. 105–112, 2021.

E. U. Ogbodo, A. M. Abu-Mahfouz, and A. M. Kurien, “A survey on 5g and lpwan-iot for improved smart cities and remote area applications: From the aspect of architecture and security,” Sensors, vol. 22, no. 16, p. 6313, 2022.

B. Manale and T. Mazri, “Security of communication 5g-v2x: A proposed approach based on securing 5g-v2x based on blockchain,” in ITM Web of Conferences, vol. 43. EDP Sciences, 2022, p. 01025.

K. Saleem, G. M. Alabduljabbar, N. Alrowais, J. Al-Muhtadi, M. Imran, and J. J. Rodrigues, “Bio-inspired network security for 5g-enabled iot applications,” IEEE Access, vol. 8, pp. 229 152– 229 160, 2020.

F. Salahdine, T. Han, and N. Zhang, “Security in 5g and beyond recent advances and future challenges,” Security and Privacy, p. e271, 2022.

M. Attaran, “The impact of 5g on the evolution of intelligent automation and industry digitization,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–17, 2021.

A. Makkar, “Enhancing iot security using 5g capabilities,” 2021.

P. Varga, J. Peto, A. Franko, D. Balla, D. Haja, F. Janky, G. Soos, D. Ficzere, M. Maliosz, and L. Toka, “5g support for industrial iot applications—challenges, solutions, and research gaps,” Sensors, vol. 20, no. 3, p. 828, 2020

Sarangi, D. P. K. . (2022). Malicious Attacks Detection Using Trust Node Centric Weight Management Algorithm in Vehicular Platoon. Research Journal of Computer Systems and Engineering, 3(1), 56–61. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/42

Balasubramanian, S. ., Naruka, M. S. ., & Tewari, G. (2023). Denoising ECG Signal Using DWT with EAVO . International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 231–237. https://doi.org/10.17762/ijritcc.v11i3s.6184

Downloads

Published

04.11.2023

How to Cite

Kulkarni, A. V. ., Sasi, S. ., Menon, R. ., & Venkatesan, M. . (2023). A systemetic Review on Security, Strength and Core of 5G. International Journal of Intelligent Systems and Applications in Engineering, 12(3s), 260–269. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3704

Issue

Section

Research Article