A Review on Future Security Challenges in 5G

Future Security Challenges in 5G

Authors

  • Harish Muthuveeran Shanmugam Lecturer, Department of Electrical and Electronics, Faculty of Engineering and Built Environment, Lincoln University College, Malaysia.
  • Supraja Srinivasan Lecturer, Department of Electrical and Electronics, Faculty of Engineering and Built Environment, Lincoln University College, Malaysia.

DOI:

https://doi.org/10.46977/apjmt.2020v01i02.002

Keywords:

Security, 5G mobile Technology, Botnet

Abstract

The 5th Generation Mobile Technology will provide broadband internet access anywhere enabling users to connect with multiple devices on the go with Internet of Things (IoT). Technological enablers such as fog and cloud computing with Software defined Networking and Network function Virtualization. With the evolution from 4G to 5G there are many security challenges to be investigated for growing demands of user privacy. In this paper we provide an overview of different cryptographic attacks that can take place inside a 5G mobile network. Furthermore, we present the countermeasures for all the possible attacks and analyze future security challenges.

Downloads

Download data is not yet available.

References

G PPP. The 5G Infrastructure Public Private Partnership. Retrieved from http://5g-ppp.eu/.

Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2017). 5G security: Analysis of threats and solutions", 2017 IEEE Conference on Standards for Communications and Networking (CSCN), 193-199.

Fang, D., Qian, Y., & Hu, R. Q. (2017). Security for 5G mobile wireless networks. IEEE Access, 6, 4850-4874.

Horn, G., & Schneider, P. (2015, August). Towards 5G security. In Proc. 4th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland.

https://www.networkworld.com/article/3098351/security/how-bandwidth-thieves-will-be-nabbed-in-the-future.html

Huawei Technologies Co., Ltd. (2016). White paper: 5G Network Architecture- A high level perspective.

Huawei Technologies Co., Ltd. (2019). Huawei 5 G security white paper.

Li, J., Zhao, Z., & Li, R. (2017). Machine learning-based IDS for software-defined 5G network. IET Networks, 7(2), 53-60.

Liyanage, M., Ahmad, I., Abro, A. B., Gurtov, A., & Ylianttila, M. (Eds.). (2018). Comprehensive Guide to 5G Security. John Wiley & Sons, Incorporated.

Mantas, G., Komninos, N., Rodriuez, J., Logota, E. & Marques, H. (2015). Security for 5G Communications. In: J. Rodriguez (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.

Patrick, N. (2016, July 21). How bandwidth thieves will be nabbed in the future.

Rodriguez, J. (2015). Fundamentals of 5G mobile networks. John Wiley & Sons.

TPM. (2018, June 13). Trusted Platform Module. Retrieved from https://www.techopedia.com/definition/4146/trusted-platform-module-tpm

Published

2020-10-31

How to Cite

Shanmugam, H. M., & Srinivasan, S. (2020). A Review on Future Security Challenges in 5G : Future Security Challenges in 5G. Asia-Pacific Journal of Management and Technology (AJMT), 1(2), 8-12. https://doi.org/10.46977/apjmt.2020v01i02.002

Metrics