“…Many papers proposed the transition from current PPDR networks to 5G ( [4], [65], [72], [74], [75], [77], [81], [87], [88], [89], [90], [91], [92], [93], [94]), due to the requirement to exchange data, images, and videos, not only voice.…”
Section: ) 5g Overviewmentioning
confidence: 99%
“…In IoT environments that are more heterogeneous and require flexibility and scalability, functions such as SDN, NFV, and network slices, make 5G the appropriate technology for this scenario. However, Confidentiality [4], [72], [77], [86], [90] and Integrity [77], [86], [89], [91], [92], [93], [94] is guarantee in 5G networks, Subscription Concealed Identifier (SUCI) is a privacy-preserving identifier containing the concealed Subscription Permanent Identifier (SUPI). The UE generates a SUCI using a protection scheme with the public key of the Home Network (HN) that was securely provisioned to the User SIM during the User SIM registration.…”
Section: Comprehensive Comparison Over 4g and 5g Security For Ppdr Sy...mentioning
confidence: 99%
“…Only the Mobile Subscriber Identification Number (MSIN) part of the SUPI gets concealed by the protection scheme while the home network identifier Mobile Country Code (MCC) and Mobile Network Code (MNC) gets transmitted in plaintext. The Authentication [86], [91], [92], [93], [94] and Nonrepudiation [86], [91], [92], [93], [94] in 5G networks is provided by Service-based architecture (SBA), this service has been proposed for the 5G core network. Consequently, new entities and new service requests have also been defined in 5G.…”
Section: Comprehensive Comparison Over 4g and 5g Security For Ppdr Sy...mentioning
The present survey seeks to contribute to the existing discussion about the changing of current Public Protection and Disaster Relief (PPDR) networks (TETRA, TETRAPOL, P25, and DMR) to commercial cellular networks (4G and 5G). The availability and robustness of these commercial networks are challenging current PPDR networks and creating opportunities for a successful transition of existing systems to commercial cellular networks. Specifically, 5G networks aim to support a massive number of heterogeneous devices while providing ultra-reliable low latency communications, higher mobility, and the capability of customised support of applications via network slicing, thus providing a natural contribution to mission critical systems. This survey details the essential mission requirements of security of PPDR systems, describes the state of the art of the most used technologies and discusses their evolution to 4G and 5G cellular networks. Furthermore, it analyses future research directions that may contribute to a successful transition of current systems to the newer cellular networks.
“…Many papers proposed the transition from current PPDR networks to 5G ( [4], [65], [72], [74], [75], [77], [81], [87], [88], [89], [90], [91], [92], [93], [94]), due to the requirement to exchange data, images, and videos, not only voice.…”
Section: ) 5g Overviewmentioning
confidence: 99%
“…In IoT environments that are more heterogeneous and require flexibility and scalability, functions such as SDN, NFV, and network slices, make 5G the appropriate technology for this scenario. However, Confidentiality [4], [72], [77], [86], [90] and Integrity [77], [86], [89], [91], [92], [93], [94] is guarantee in 5G networks, Subscription Concealed Identifier (SUCI) is a privacy-preserving identifier containing the concealed Subscription Permanent Identifier (SUPI). The UE generates a SUCI using a protection scheme with the public key of the Home Network (HN) that was securely provisioned to the User SIM during the User SIM registration.…”
Section: Comprehensive Comparison Over 4g and 5g Security For Ppdr Sy...mentioning
confidence: 99%
“…Only the Mobile Subscriber Identification Number (MSIN) part of the SUPI gets concealed by the protection scheme while the home network identifier Mobile Country Code (MCC) and Mobile Network Code (MNC) gets transmitted in plaintext. The Authentication [86], [91], [92], [93], [94] and Nonrepudiation [86], [91], [92], [93], [94] in 5G networks is provided by Service-based architecture (SBA), this service has been proposed for the 5G core network. Consequently, new entities and new service requests have also been defined in 5G.…”
Section: Comprehensive Comparison Over 4g and 5g Security For Ppdr Sy...mentioning
The present survey seeks to contribute to the existing discussion about the changing of current Public Protection and Disaster Relief (PPDR) networks (TETRA, TETRAPOL, P25, and DMR) to commercial cellular networks (4G and 5G). The availability and robustness of these commercial networks are challenging current PPDR networks and creating opportunities for a successful transition of existing systems to commercial cellular networks. Specifically, 5G networks aim to support a massive number of heterogeneous devices while providing ultra-reliable low latency communications, higher mobility, and the capability of customised support of applications via network slicing, thus providing a natural contribution to mission critical systems. This survey details the essential mission requirements of security of PPDR systems, describes the state of the art of the most used technologies and discusses their evolution to 4G and 5G cellular networks. Furthermore, it analyses future research directions that may contribute to a successful transition of current systems to the newer cellular networks.
“…The authors in [ 17 , 18 ] showed that public safety communications can benefit from deploying UAVs for providing broadband connectivity and extending network coverage and capacity. The ability to cover unreachable locations was the motivation behind the use of UAVs in a public safety solution for real-time immersive remote monitoring in [ 19 ].…”
Section: Related Workmentioning
confidence: 99%
“…Although the authors in [ 19 , 20 ] introduced using wearable devices by first responders, the presented use cases were limited to conventional high-end augmented/virtual reality (AR/VR) and low-end Internet of Things (IoT) applications. While AR/VR head-mounted devices were employed in [ 19 ] for immersive remote presence, ref. [ 20 ] proposed the utilization of IoT sensors and cameras in a collaborative system for disaster management.…”
Public safety agencies have been working on the modernization of their communication networks and the enhancement of their mission-critical capabilities with novel technologies and applications. As part of these efforts, migrating from traditional land mobile radio (LMR) systems toward cellular-enabled, next-generation, mission-critical networks is at the top of these agencies’ agendas. In this paper, we provide an overview of cellular technologies ratified by the 3rd Generation Partnership Project (3GPP) to enable next-generation public safety networks. On top of using wireless communication technologies, emergency first responders need to be equipped with advanced devices to develop situational awareness. Therefore, we introduce the concept of the Internet of Life-Saving Things (IoLST) and focus on the role of wearable devices—more precisely, cellular-enabled wearables, in creating new solutions for enhanced public safety operations. Finally, we conduct a performance evaluation of wearable-based, mission-critical applications. So far, most of the mission-critical service evaluations target latency performance without taking into account reliability requirements. In our evaluation, we examine the impact of device- and application-related parameters on the latency and the reliability performance. We also identify major future considerations for better support of the studied requirements in next-generation public safety networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.