5G Security Threat Landscape, AI and Blockchain

被引:0
|
作者
Mohammad N. Alanazi
机构
[1] Al-Imam Mohammad Ibn Saud Islamic University (IMSIU),College of Computer and Information Sciences
来源
关键词
5G; IoT; Security; Artificial intelligence; Machine learning; Blockchain;
D O I
暂无
中图分类号
学科分类号
摘要
The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitigate emerging threats. This paper provides an exhaustive exploration of the 5G Security Threat Landscape investigating the intricacies of security challenges while harnessing innovative solutions to protect the IoT ecosystem. The study comprehensively unravels the diversity of security requirements, including critical aspects such as authentication, encryption, network slicing, and security by design, threat detection, and collaborative frameworks. By elucidating these foundational pillars, the paper highlights the interconnection between security paradigms and technological advancements, under scoring the pivotal role played by Artificial Intelligence (AI), Machine Learning (ML), and blockchain technologies in enhancing security measures. Through an integration of interdisciplinary research, the study emphasizes the imperative of synchronizing collective efforts among stakeholders to mitigate vulnerabilities and facilitate a secure IoT environment within the dynamic 5G landscape. As the technological landscape evolves, this research contributes to the ongoing research of securing the digital infrastructures, at par with researchers, practitioners, and policymakers, as they collectively set up a secure and resilient cyberspace.
引用
收藏
页码:1467 / 1482
页数:15
相关论文
共 50 条
  • [31] Integration of 5G, VANETs and Blockchain Technology
    Arif, Muhammad
    Balzano, Walter
    Fontanella, Alessandro
    Stranieri, Silvia
    Wang, Guojun
    Xing, Xiaofei
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 2007 - 2013
  • [32] Blockchain and Federated Learning for 5G Beyond
    Lu, Yunlong
    Huang, Xiaohong
    Zhang, Ke
    Maharjan, Sabita
    Zhang, Yan
    IEEE NETWORK, 2021, 35 (01): : 219 - 225
  • [33] An Overview of the 5G Patent Landscape
    Naghipour, Mohammad Sadegh
    Rahim, Zulhasni Abdul
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2025, 33 (02): : 693 - 723
  • [34] Threat framework for 5G cellular communications
    Vanderveen, Michaela
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [35] A Systematic Analysis of 5G Networks With a Focus on 5G Core Security
    Tang, Qiang
    Ermis, Orhan
    Nguyen, Cu D.
    De Oliveira, Alexandre
    Hirtzig, Alain
    IEEE ACCESS, 2022, 10 : 18298 - 18319
  • [36] 5G Cyberspace Security Game
    Xu Jin
    Wu Huici
    Tao Xiaofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2319 - 2329
  • [37] 5G and the Future of Security in ICT
    Soldani, David
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [38] A Survey of 5G Security Considerations
    Casey, Michael L.
    McClellan, Stan
    THIRTEENTH INTERNATIONAL CONFERENCE ON DIGITAL TELECOMMUNICATIONS (ICDT 2018), 2018, : 19 - 24
  • [39] A COMPREHENSIVE GUIDE TO 5G SECURITY
    Ghafoor, Saim
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (06) : 5 - 5
  • [40] 5G and Security Service Innovation
    Marukawa K.
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2020, 74 (03): : 428 - 433