2018
DOI: 10.1109/mcomstd.2018.1700063
|View full text |Cite
|
Sign up to set email alerts
|

Overview of 5G Security Challenges and Solutions

Abstract: The next generation networks (5G) will use novel technological concepts to meet the requirements of broadband access everywhere, high user and device mobility, and connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultra-reliable and affordable way. Software Defined Networking (SDN) and Network Function Virtualization (NFV) leveraging the advances in cloud computing such as Mobile Edge Computing are the most sought out technologies to meet these requirements. However, securely usin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
189
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 360 publications
(216 citation statements)
references
References 14 publications
0
189
0
3
Order By: Relevance
“…While rolling out 5G networks in the nextgeneration smart cities in general and UK in particular, due to many new features of 5G networks and the fact that 5G will envelop almost all dimensions of human life, business, and government affairs with ultra-high-speed access to services, anywhere, anytime and any type, 5G security requirements have to be thoroughly researched [55]. 5G rollout will also bring a wide range of threats and a greatly expanded attack surface [56]. For example, 5G physical layer security at the RAN [55] is susceptible to new types of attacks and performance bottlenecks such as eavesdropping, contaminating, spoofing, and jamming.…”
Section: Security Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…While rolling out 5G networks in the nextgeneration smart cities in general and UK in particular, due to many new features of 5G networks and the fact that 5G will envelop almost all dimensions of human life, business, and government affairs with ultra-high-speed access to services, anywhere, anytime and any type, 5G security requirements have to be thoroughly researched [55]. 5G rollout will also bring a wide range of threats and a greatly expanded attack surface [56]. For example, 5G physical layer security at the RAN [55] is susceptible to new types of attacks and performance bottlenecks such as eavesdropping, contaminating, spoofing, and jamming.…”
Section: Security Challengesmentioning
confidence: 99%
“…New 5G paradigms will have to be handled by the UK MNO businesses. For example, security challenges related to network slicing; such as on-demand security isolation of network slices, the security of interslice communications, impersonation attack, security policy mismatch, DoS attack, side-channel attacks, privacy attacks, resource harmonization between inter-domain slice segments and hypervisor attacks have to be considered [56,61]. New types of 5G-based verticals, e.g., IoT, need to establish secure 5G-based network slicing technique with secure key establishment among IoT devices, MEC, and IoT cloud server [67].…”
Section: Security Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacks and vulnerabilities of attacks, like DoS, are considerable issues for the future mobile generations. Ahmad et al [45] presented the review of the challenges, and privacy and security issues in the clouds, softwaredefined networking, and network function virtualization along with their perspective security solutions. The major contribution of the authors includes the analysis of the attack-vulnerabilities and mitigation for making a secure 5G network.…”
Section: Existing Surveys and Their Applicabilitymentioning
confidence: 99%
“…The authors discuss the challenges and research directions on the 5G security. Ahmad et al [45] 2018 5G Networks The authors review the challenges and issues of privacy and security in the clouds, software defined networking, and network functions virtualization and presents respective solution for these issues. Wu et al [21] 2018 5G Wireless Networks…”
Section: Key Contributionmentioning
confidence: 99%