A cybersecurity review in IoT 5G networks

被引:3
作者
Narciandi-Rodriguez, Diego [1 ]
Aveleira-Mata, Jose [2 ]
Garcia-Ordas, Maria Teresa [2 ]
Alfonso-Cendon, Javier [3 ]
Benavides, Carmen [2 ]
Alaiz-Moreton, Hector [1 ]
机构
[1] Univ Leon, RIASC Res Inst Appl Sci Cybersecur, MIC, Campus Vegazana S-N, Leon 24071, Spain
[2] Univ Leon, Escuela Ingn, SECOMUCI Res Grp, Dept Elect Syst & Automat Engn, Campus Vegazana s-n, Leon 24071, Spain
[3] Univ Leon, Escuela Ingn, Dept Mech Comp Sci & Aerosp Engn, Campus Vegazana S-N, Leon 24071, Spain
关键词
5G; IoT; Attacks; Cybersecurity; Networks; Vulnerabilities; SECURITY; INTERNET; THINGS; CHALLENGES; TRENDS; DDOS;
D O I
10.1016/j.iot.2024.101478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive review of cybersecurity in 5G-enabled Internet of Things (IoT) networks, a rapidly expanding field where data security is paramount due to the increasing connectivity and sensitivity of IoT applications. Building upon existing literature, including foundational technical documents and recent studies on 5G security, we explore the primary elements and threats within this ecosystem. Key concepts are examined, covering 5G networks, architecture, cybersecurity protocols, IoT, and standards developed by 3GPP to contextualize the complex interplay of technologies involved. Our study employs the PRISMA methodology, which allows for a systematic review of relevant sources across major research databases, providing a structured synthesis of recent advancements and persisting challenges. We delve into the state of the art, detailing prominent use cases and their associated vulnerabilities, which expose critical risks within both the 5G network elements and IoT endpoints. In particular, this review identifies and categorizes primary attack vectors, examining how the convergence of 5G and IoT introduces challenges to cybersecurity frameworks. This review also outlines limitations in current research, including gaps in standardized defense mechanisms and challenges in threat detection and response capabilities. Our findings underscore the importance of ongoing research into resilient security solutions tailored for 5G-IoT ecosystems, concluding with recommendations for future research directions to fortify this essential area of network security.
引用
收藏
页数:25
相关论文
共 154 条
[91]   5G Internet of Things: A survey [J].
Li, Shancang ;
Xu, Li Da ;
Zhao, Shanshan .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2018, 10 :1-9
[92]   Mapping Cyber Threats in the 5G Supply Chain: Landscape, Vulnerabilities, and Risk Management [J].
Lyu, Moyan ;
Farooq, Junaid ;
Zhu, Quanyan .
IEEE NETWORK, 2025, 39 (01) :251-260
[93]  
Madakam S., 2015, J. Comput. Commun., V3, P164, DOI DOI 10.4236/JCC.2015.35021
[94]   NFV security survey in 5G networks: A three-dimensional threat taxonomy [J].
Madi, Taous ;
Alameddine, Hyame Assem ;
Pourzandi, Makan ;
Boukhtouta, Amine .
COMPUTER NETWORKS, 2021, 197
[95]   Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks [J].
Mamolar, Ana Serrano ;
Salva-Garcia, Pablo ;
Chirivella-Perez, Enrique ;
Pervez, Zeeshan ;
Calero, Jose M. Alcaraz ;
Wang, Qi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145
[96]   On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids [J].
Mathas, Christos-Minas ;
Vassilakis, Costas ;
Kolokotronis, Nicholas ;
Zarakovitis, Charilaos C. ;
Kourtis, Michail-Alexandros .
ENERGIES, 2021, 14 (10)
[97]  
Mendeley Ltd, 2024, Mendeley reference manager
[98]  
Miadzvetskaya, 2022, Cybersecurity, P437
[99]  
Mir Aabid, 2020, 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), P249, DOI 10.1109/SMART-TECH49988.2020.00063
[100]   5G in Healthcare: From COVID-19 to Future Challenges [J].
Moglia, Andrea ;
Georgiou, Konstantinos ;
Marinov, Blagoi ;
Georgiou, Evangelos ;
Berchiolli, Raffaella Nice ;
Satava, Richard M. ;
Cuschieri, Alfred .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (08) :4187-4196