DOI QR코드

DOI QR Code

5th Generation Wireless Networks Security: Challenges and Solutions

  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

In reason of the high capacity and low latency, the 5G wireless networks used nowadays in many of life applications such as: remote surgery and guiding vehicle. The high requirements of 5G networks makes it more vulnerable for security threats and attacks. This paper presents some challenges faced by 5G networks and presets some of the security solutions.

Keywords

References

  1. M. T. OMERANI Hanane, "4G and 5G: Security and privacy analysis".
  2. Y. Q. a. R. Q. H. DONGFENG FANG, "Security for 5G Mobile Wireless Networks," IEEE, 2017.
  3. A. B. S. A. P. K. M. C. S. SULLIVAN, "5G Security Challenges and Solutions: A Review by OSI Layers," IEEE, 2021.
  4. T. K. M. L. J. O. M. Y. A. G. Ijaz Ahmad, "Overview of 5G Security Challenges and Solutions," ResearchGate, 2018.
  5. D. Q. H. a. A. D. Areej Alsini, "Hashtag Recommendation Methods for Twitter and Sina Weibo:A Review," MDPI, 2021.
  6. M. L. X. L. Xiaoling Xu, "Key technology and application ofmillimeter wave communications for 5G: a survey," Springer, 2018.
  7. WIKIPEDIA, "Heterogeneous network," [Online]. Available: https://en.wikipedia.org/wiki/Heterogeneous_network. [Accessed 19 4 2022].
  8. S. R. S. K. S. M. M. S. A. E. A. T. W. K. Y. P. a. J. H. P. Jin Ho Park, "A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions," hcisijournal, 2021.
  9. G. NGMN Alliance, "5G Security Recommendations Package #1," 2016.
  10. N. D. a. V. L. M. Conti, "A survey of man in the middle attacks," IEEE, 2016.
  11. M. L. ,. K. J. M. AN BRAEKEN, "Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks," IEEE, 2019.
  12. M. N. a. G. S. E. Dubrova, "CRC-based message authentication for 5G mobile technology," IEEE, 2015.
  13. T. J. Jing YANG, "An overview of cryptographic primitives for possible use in 5G and beyond," SCIENCE CHINA, 2020.
  14. M. B. Nicholas J H, "Secure human identification protocols," Springer, 2001.
  15. L. H. J. C. A. X. C. HAIOU HUANG, "An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks," IEEE, 2019.
  16. Z. Z. D. Z. F. P. &. L. H. MA Zheng, "Key techniques for 5G wireless communications:network architecture, physical layer,and MAC layer perspectives," SCIENCE CHINA, 2015.
  17. Y. L. Jingfeng Zhao, "Supply chain security evaluation model and index system based on a 5G information system," Springer, 2021.
  18. P. M. S. S. A. L. J. F. H. M. G. P. S. S. H. C. G. M. P. Jose Maria Jorquera Valero, "Design of a Security and Trust Framework for 5G," Journal of Network and Systems Management, 2021.
  19. S. A. Alghamdi, "Novel trust-aware intrusion detection and prevention system for 5G," Springer, 2021.
  20. P.-H. L. a. E. J. A. Zappone, IEEE, 2016.
  21. Y. S. J. a. J. H. P. S. K. Singh, "A deep learning-based IoT-oriented infrastructure for secure smart City," Sustainable Cities and Society, 2020.
  22. Z. D. a. K. A. M. A. Abro, "A Lightweight elliptic-ElGamal-based authentication scheme for secure device-to-device communication," Future Internet, 2019.
  23. H. S.-C. M. Yosra Benslimen, "Attacks and failures prediction framework for acollaborative 5G mobile network," Springer, 2021.