Security for 5G and Beyond

被引:228
作者
Ahmad, Ijaz [1 ,2 ]
Shahabuddin, Shahriar [1 ,3 ]
Kumar, Tanesh [1 ]
Okwuibe, Jude [1 ]
Gurtov, Andrei [4 ]
Ylianttila, Mika [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, FIN-90570 Oulu, Finland
[2] VTT Tech Res Ctr Finland, Espoo 02150, Finland
[3] Nokia, Oulu 90620, Finland
[4] Linkoping Univ, Dept Comp & Informat Sci, SE-58183 Linkoping, Sweden
基金
芬兰科学院;
关键词
5G mobile communication; Wireless networks; Authentication; Protocols; Cloud computing; 5G; security; mobile networks security; SDN security; NFV security; cloud security; privacy; security challenges; security solutions; PHYSICAL LAYER SECURITY; SOFTWARE-DEFINED-NETWORK; OF-THE-ART; NEXT-GENERATION; WIRELESS NETWORKS; MASSIVE MIMO; ARTIFICIAL-INTELLIGENCE; COMMUNICATION TECHNOLOGIES; INTRUSION DETECTION; FAST AUTHENTICATION;
D O I
10.1109/COMST.2019.2916180
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as future generations (XG) in this paper. In brief, this paper highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
引用
收藏
页码:3682 / 3722
页数:41
相关论文
共 377 条
[1]  
3G Security
[2]  
Security Architecture, 2008, 33102 3GPP TS
[3]  
Abro A. B., 2018, COMPREHENSIVE GUIDE, P231
[4]   Next Generation 5G Wireless Networks: A Comprehensive Survey [J].
Agiwal, Mamta ;
Roy, Abhishek ;
Saxena, Navrati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1617-1655
[5]   Design Considerations for a 5G Network Architecture [J].
Agyapong, Patrick Kwadwo ;
Iwamura, Mikio ;
Staehle, Dirk ;
Kiess, Wolfgang ;
Benjebbour, Anass .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) :65-75
[6]  
Ahmad Bashir, 2015, Egyptian Academic Journal of Biological Sciences B Zoology, V7, P1
[7]  
Ahmad Ijaz, 2018, IEEE Communications Standards Magazine, V2, P36, DOI 10.1109/MCOMSTD.2018.1700063
[8]  
Ahmad Ijaz, 2016, 2016 12th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), P1
[9]  
Ahmad I., 2018, THESIS
[10]  
Ahmad I., 2017, P EUR C NETW COMM EU, P1