A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

被引:11
作者
Scalise, Paul [1 ]
Boeding, Matthew [1 ]
Hempel, Michael [1 ]
Sharif, Hamid [1 ]
Delloiacovo, Joseph [2 ]
Reed, John [2 ]
机构
[1] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[2] Belcan Govt Solut BGS, Bellevue, NE 68123 USA
关键词
5G; security; survey; Zero Trust architecture; confidentiality; integrity; availability; blockchain; post-quantum cryptography; RECONFIGURABLE INTELLIGENT SURFACE; PHYSICAL LAYER SECURITY; WIRELESS COMMUNICATIONS; MASSIVE MIMO; NETWORKS; ARCHITECTURES; BLOCKCHAIN; PRIVACY; MOBILE; ATTACK;
D O I
10.3390/fi16030067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today's world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.
引用
收藏
页数:38
相关论文
共 152 条
  • [1] 3GPP, 2022, Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
  • [2] Overall description
  • [3] Stage 2 (Release 15), Technical Specification (TS) 36.300, 3rd Generation Partnership Project (3GPP)
  • [4] Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
    Adesina, Damilola
    Hsieh, Chung-Chu
    Sagduyu, Yalin E.
    Qian, Lijun
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 77 - 100
  • [5] A Survey on Hybrid Beamforming Techniques in 5G: Architecture and System Model Perspectives
    Ahmed, Irfan
    Khammari, Hedi
    Shahid, Adnan
    Musa, Ahmed
    Kim, Kwang Soon
    De Poorter, Eli
    Moerman, Ingrid
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3060 - 3097
  • [6] Alipour MA, 2022, Arxiv, DOI arXiv:2210.01739
  • [7] Cyber-Attack Detection and Mitigation Using SVM for 5G Network
    Alshunaifi, Sulaiman Yousef
    Mishra, Shailendra
    AlShehri, Mohammed Abdul Rahman
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01) : 13 - 28
  • [8] What Will 5G Be?
    Andrews, Jeffrey G.
    Buzzi, Stefano
    Choi, Wan
    Hanly, Stephen V.
    Lozano, Angel
    Soong, Anthony C. K.
    Zhang, Jianzhong Charlie
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) : 1065 - 1082
  • [9] [Anonymous], 2023, OAuth OAuth 2.0, an Industry-Standard Protocol for Authorization
  • [10] [Anonymous], 2023, Technical Specification for Installation of Wastewater On-Line Monitoring System (CODcr