Towards secure 5G networks: A Survey

被引:64
作者
Zhang, Shunliang [1 ,2 ]
Wang, Yongming [1 ,2 ]
Zhou, Weihua [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
关键词
5G; Security; Privacy; Network slicing; SBA; New radio; D2D; NFV; SDN; MTC; MEC; SOFTWARE DEFINED NETWORKS; DEVICE D2D COMMUNICATION; PHYSICAL LAYER SECURITY; WIRELESS NETWORKS; CHANNEL CHARACTERISTICS; COMPUTING PARADIGM; KEY GENERATION; MASSIVE MIMO; CHALLENGES; PRIVACY;
D O I
10.1016/j.comnet.2019.106871
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To support various new use cases from vertical industries besides enhanced mobile broadband communication services, the 5G system aims to provide higher speed, lower latency, and massive connectivity to various devices by leveraging the evolution of 4G with the addition of new radio technology, service-based architecture, and cloud infrastructure. The introduction of new technologies, new use cases and people's growing concerns regarding privacy issues brings new challenges to providing security and privacy protection for 5G. This paper makes an extensive review of the state of the art towards ensuring 5G security and privacy. By analyzing the lessons from the 4G security system, the requirements from new scenarios and models, the challenges resulting from new technology and paradigm, we identify typical security and privacy issues to be solved in 5G. Then, we discuss potential solutions from academia and industry to secure 5G networks from several perspectives, including the overall 5G security framework, core network, radio access network, cloud infrastructure, and the Internet of things. Finally, several key open issues and potential research directions are identified and discussed. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:22
相关论文
共 193 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]  
AbdElRahem O, 2016, PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), P32, DOI 10.1109/ICCES.2016.7821971
[3]   Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions [J].
Afolabi, Ibrahim ;
Taleb, Tarik ;
Samdanis, Konstantinos ;
Ksentini, Adlen ;
Flinck, Hannu .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03) :2429-2453
[4]   Overview of 5G Security Challenges and Solutions [J].
Ahmad, Ijaz ;
Kumar, Tanesh ;
Liyanage, Madhusanka ;
Okwuibe, Jude ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[5]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[6]  
Al-Shaer E., 2010, P 3 ACM WORKSHOP ASS, P37, DOI DOI 10.1145/1866898.1866905
[7]   Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints [J].
Alavi, Faezeh ;
Yamchi, Nader Mokari ;
Javan, Mohammad R. ;
Cumanan, Kanapathippillai .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) :8072-8085
[8]   Characteristics and Etiologies of Chronic Scrotal Pain: A Common but Poorly Understood Condition [J].
Aljumaily, Aosama ;
Al-Khazraji, Hind ;
Gordon, Allan ;
Lau, Susan ;
Jarvi, Keith A. .
PAIN RESEARCH & MANAGEMENT, 2017, 2017 :1-5
[9]  
[Anonymous], TR33861 3GPP
[10]  
[Anonymous], TR33825 3GPP