A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain

被引:7
作者
Shafi, Misbah [1 ]
Jha, Rakesh Kumar [1 ]
Sabraj, Manish [1 ]
机构
[1] Shri Mata Vaishno Devi Univ, Dept Elect & Commun, J K, India
关键词
5G NR; Security; Artificial rain; Artificial dust; D2D; Miss-rate; Half-duplex attack; PHYSICAL-LAYER SECURITY; ULTRA-DENSE NETWORKS; PILOT CONTAMINATION AVOIDANCE; TO-DEVICE COMMUNICATION; MASSIVE MIMO SYSTEMS; WIRELESS NETWORKS; RECIPROCITY CALIBRATION; INTERNET; PRIVACY; THINGS;
D O I
10.1016/j.jnca.2020.102597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security concerns of each technology are defined mathematically. Thereby defining the impact on the factors of security. Moreover, a methodology is developed in which the influence on security due to artificially generated rain and artificially generated dust on the wireless communication network is studied. By doing so, an attacking scenario is identified, where a half-duplex attack in D2D communication is attained. Half-duplex attack specifies the attack solely on the downlink to spoof the allocated resources, with reduced miss-rate. Thus, ultra-reliable and adequate advances are required to be addressed to remove the obstacles that create a hindrance in achieving the secured and authenticated communicating network.
引用
收藏
页数:25
相关论文
共 50 条
  • [31] Physical Layer Security for Beyond 5G: Ultra Secure Low Latency Communications
    Yerrapragada, Anil Kumar
    Eisman, Taylor
    Kelley, Brian
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 (02): : 2232 - 2242
  • [32] Artificial Intelligence Development and Music Education System Reform in the Context of 5G Network
    Zhang, Zi
    Li, Zhuolin
    Pan, Jian
    Chen, Wenli
    Bai, Qiulin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] Security Standards and Measures for Massive IoT in the 5G Era
    Qiu, Qin
    Wang, Ding
    Du, Xuetao
    Yu, Shengquan
    Liu, Shenglan
    Zhao, Bei
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01) : 392 - 403
  • [34] Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review
    Khan, Muhammad Asghar
    Kumar, Neeraj
    Alsamhi, Saeed Hamood
    Barb, Gordana
    Zywiolek, Justyna
    Ullah, Insaf
    Noor, Fazal
    Shah, Jawad Ali
    Almuhaideb, Abdullah M.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 892 - 912
  • [35] Security Analysis of Critical 5G Interfaces
    Mahyoub, Mohammed
    Abdulghaffar, Abdulaziz
    Alalade, Emmanuel
    Ndubisi, Ezekiel
    Matrawy, Ashraf
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2382 - 2410
  • [36] Machine Learning Threatens 5G Security
    Suomalainen, Jani
    Juhola, Arto
    Shahabuddin, Shahriar
    Mammela, Aarne
    Ahmad, Ijaz
    IEEE ACCESS, 2020, 8 : 190822 - 190842
  • [37] Overview on the security in 5G phase 2
    Henda N.B.
    Journal of ICT Standardization, 2019, 8 (01): : 1 - 14
  • [38] Towards 5G Security
    Horn, Guenther
    Schneider, Peter
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1165 - 1170
  • [39] 5G Vulnarabilities from Security Operation Center's Perspective
    Mahmoud, Doaa
    Toth, Andras Balint
    Kail, Eszter
    Banati, Anna
    21ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2021, : 31 - 36
  • [40] 5G Security: Analysis of Threats and Solutions
    Ahmad, Ijaz
    Kumar, Tanesh
    Liyanage, Madhusanka
    Okwuibe, Jude
    Ylianttila, Mika
    Gurtov, Andrei
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 193 - 199