A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain

被引:7
|
作者
Shafi, Misbah [1 ]
Jha, Rakesh Kumar [1 ]
Sabraj, Manish [1 ]
机构
[1] Shri Mata Vaishno Devi Univ, Dept Elect & Commun, J K, India
关键词
5G NR; Security; Artificial rain; Artificial dust; D2D; Miss-rate; Half-duplex attack; PHYSICAL-LAYER SECURITY; ULTRA-DENSE NETWORKS; PILOT CONTAMINATION AVOIDANCE; TO-DEVICE COMMUNICATION; MASSIVE MIMO SYSTEMS; WIRELESS NETWORKS; RECIPROCITY CALIBRATION; INTERNET; PRIVACY; THINGS;
D O I
10.1016/j.jnca.2020.102597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security concerns of each technology are defined mathematically. Thereby defining the impact on the factors of security. Moreover, a methodology is developed in which the influence on security due to artificially generated rain and artificially generated dust on the wireless communication network is studied. By doing so, an attacking scenario is identified, where a half-duplex attack in D2D communication is attained. Half-duplex attack specifies the attack solely on the downlink to spoof the allocated resources, with reduced miss-rate. Thus, ultra-reliable and adequate advances are required to be addressed to remove the obstacles that create a hindrance in achieving the secured and authenticated communicating network.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Integration of VANET and 5G Security: A review of design and implementation issues
    Hussain, Rasheed
    Hussain, Fatima
    Zeadally, Sherali
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 843 - 864
  • [2] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [3] A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective
    Yue, Kaifeng
    Zhang, Yuanyuan
    Chen, Yanru
    Li, Yang
    Zhao, Lian
    Rong, Chunming
    Chen, Liangyin
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2191 - 2217
  • [4] MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
    Ranaweera, Pasika
    Jurcut, Anca
    Liyanage, Madhusanka
    ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [5] A Comprehensive Survey on Security Issues in 5G Wireless Communication Network using Beamforming Approach
    Sharma, Arunima
    Jha, Rakesh Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (04) : 3447 - 3501
  • [6] A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
    Khan, Rabia
    Kumar, Pardeep
    Jayakody, Dushantha Nalin K.
    Liyanage, Madhusanka
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 196 - 248
  • [7] Towards secure 5G networks: A Survey
    Zhang, Shunliang
    Wang, Yongming
    Zhou, Weihua
    COMPUTER NETWORKS, 2019, 162
  • [8] A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
    Scalise, Paul
    Boeding, Matthew
    Hempel, Michael
    Sharif, Hamid
    Delloiacovo, Joseph
    Reed, John
    FUTURE INTERNET, 2024, 16 (03)
  • [9] 5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance
    Nencioni, Gianfranco
    Garroppo, Rosario G. G.
    Olimid, Ruxandra F. F.
    IEEE ACCESS, 2023, 11 : 63496 - 63533
  • [10] A Survey on 5G Network Technologies from Social Perspective
    Singh, Sukhdeep
    Saxena, Navrati
    Roy, Abhishek
    Kim, HanSeok
    IETE TECHNICAL REVIEW, 2017, 34 (01) : 30 - 39