A Review on Future Security Challenges in 5G
Future Security Challenges in 5G
Keywords:Security, 5G mobile Technology, Botnet
The 5th Generation Mobile Technology will provide broadband internet access anywhere enabling users to connect with multiple devices on the go with Internet of Things (IoT). Technological enablers such as fog and cloud computing with Software defined Networking and Network function Virtualization. With the evolution from 4G to 5G there are many security challenges to be investigated for growing demands of user privacy. In this paper we provide an overview of different cryptographic attacks that can take place inside a 5G mobile network. Furthermore, we present the countermeasures for all the possible attacks and analyze future security challenges.
G PPP. The 5G Infrastructure Public Private Partnership. Retrieved from http://5g-ppp.eu/.
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2017). 5G security: Analysis of threats and solutions", 2017 IEEE Conference on Standards for Communications and Networking (CSCN), 193-199.
Fang, D., Qian, Y., & Hu, R. Q. (2017). Security for 5G mobile wireless networks. IEEE Access, 6, 4850-4874.
Horn, G., & Schneider, P. (2015, August). Towards 5G security. In Proc. 4th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland.
Huawei Technologies Co., Ltd. (2016). White paper: 5G Network Architecture- A high level perspective.
Huawei Technologies Co., Ltd. (2019). Huawei 5 G security white paper.
Li, J., Zhao, Z., & Li, R. (2017). Machine learning-based IDS for software-defined 5G network. IET Networks, 7(2), 53-60.
Liyanage, M., Ahmad, I., Abro, A. B., Gurtov, A., & Ylianttila, M. (Eds.). (2018). Comprehensive Guide to 5G Security. John Wiley & Sons, Incorporated.
Mantas, G., Komninos, N., Rodriuez, J., Logota, E. & Marques, H. (2015). Security for 5G Communications. In: J. Rodriguez (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.
Patrick, N. (2016, July 21). How bandwidth thieves will be nabbed in the future.
Rodriguez, J. (2015). Fundamentals of 5G mobile networks. John Wiley & Sons.
TPM. (2018, June 13). Trusted Platform Module. Retrieved from https://www.techopedia.com/definition/4146/trusted-platform-module-tpm
How to Cite
Copyright (c) 2020 Asia-Pacific Journal of Management and Technology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.