A cybersecurity review in IoT 5G networks

被引:4
作者
Narciandi-Rodriguez, Diego [1 ]
Aveleira-Mata, Jose [2 ]
Garcia-Ordas, Maria Teresa [2 ]
Alfonso-Cendon, Javier [3 ]
Benavides, Carmen [2 ]
Alaiz-Moreton, Hector [1 ]
机构
[1] Univ Leon, RIASC Res Inst Appl Sci Cybersecur, MIC, Campus Vegazana S-N, Leon 24071, Spain
[2] Univ Leon, Escuela Ingn, SECOMUCI Res Grp, Dept Elect Syst & Automat Engn, Campus Vegazana s-n, Leon 24071, Spain
[3] Univ Leon, Escuela Ingn, Dept Mech Comp Sci & Aerosp Engn, Campus Vegazana S-N, Leon 24071, Spain
关键词
5G; IoT; Attacks; Cybersecurity; Networks; Vulnerabilities; SECURITY; INTERNET; THINGS; CHALLENGES; TRENDS; DDOS;
D O I
10.1016/j.iot.2024.101478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive review of cybersecurity in 5G-enabled Internet of Things (IoT) networks, a rapidly expanding field where data security is paramount due to the increasing connectivity and sensitivity of IoT applications. Building upon existing literature, including foundational technical documents and recent studies on 5G security, we explore the primary elements and threats within this ecosystem. Key concepts are examined, covering 5G networks, architecture, cybersecurity protocols, IoT, and standards developed by 3GPP to contextualize the complex interplay of technologies involved. Our study employs the PRISMA methodology, which allows for a systematic review of relevant sources across major research databases, providing a structured synthesis of recent advancements and persisting challenges. We delve into the state of the art, detailing prominent use cases and their associated vulnerabilities, which expose critical risks within both the 5G network elements and IoT endpoints. In particular, this review identifies and categorizes primary attack vectors, examining how the convergence of 5G and IoT introduces challenges to cybersecurity frameworks. This review also outlines limitations in current research, including gaps in standardized defense mechanisms and challenges in threat detection and response capabilities. Our findings underscore the importance of ongoing research into resilient security solutions tailored for 5G-IoT ecosystems, concluding with recommendations for future research directions to fortify this essential area of network security.
引用
收藏
页数:25
相关论文
共 154 条
[71]  
ITU, 2024, 5g-fifth generation of mobile technologies
[72]  
Jain Anshul, 2021, Interdisciplinary Journal of Information, Knowledge, and Management, V16, P1, DOI [10.28945/4675, 10.28945/4675]
[73]   IoT Security [J].
Jamali M.A.J. ;
Heidari A. ;
Allahverdizadeh P. ;
Norouzi F. ;
Bahrami B. .
EAI/Springer Innovations in Communication and Computing, 2020, :33-83
[74]  
James E., 2023, Tensorgate J. Sustain. Technol. Infrastruct. Dev. Ctries., V6, P32
[75]   Cybersecurity threats in FinTech: A systematic review [J].
Javaheri, Danial ;
Fahmideh, Mahdi ;
Chizari, Hassan ;
Lalbakhsh, Pooia ;
Hur, Junbeom .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
[76]   Resource Allocation Schemes for 5G Network: A Systematic Review [J].
Kamal, Muhammad Ayoub ;
Raza, Hafiz Wahab ;
Alam, Muhammad Mansoor ;
Su'ud, Mazliham Mohd ;
Sajak, Aznida binti Abu Bakar .
SENSORS, 2021, 21 (19)
[77]   Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G [J].
Karakoc, Bedran ;
Furste, Nils ;
Rupprecht, David ;
Kohls, Katharina .
PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, :97-108
[78]  
Kekki S, 2018, 28 ETSI
[79]  
Khalid LF, 2021, J INF TECHNOL INFORM, V1, P6
[80]   IoT security: Review, blockchain solutions, and open challenges [J].
Khan, Minhaj Ahmad ;
Salah, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :395-411