Skip to main content

Security and Privacy in 5G-Enabled Internet of Things: A Data Analysis Perspective

  • Chapter
  • First Online:
Blockchain for 5G-Enabled IoT

Abstract

5G IoT devices have a huge impact on the world of networking but are prone to security and privacy breaches. As encryption is not the only possible way to avoid this, many researchers and scientist are working in this field to figure out the different ways to secure data. Data leak is a serious matter when important and confidential information is being communicated. Such instances have been occurring ever since world war and communication between nations and now. There are various technologies that have been developing to transfer data securely. This chapter provides a detailed method for data encryption and schemes which make it highly sophisticated to decrypt the data by hackers. Later, the author has provided some case studies for better understanding of data security and privacy in a 5G-enabled IoT network. This chapter will help the reader to understand how data is embezzled and has provided solutions in the corresponding field of research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Andersson, I. You, R. Rahmani, V. Sharma, Secure computation on 4G/5G enabled Internet-of-Things. Wirel. Commun. Mob. Comput. 2019, 3978193–3978191 (2019)

    Article  Google Scholar 

  2. I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of Things: Security vulnerabilities and challenges, in 2015 IEEE Symposium on Computers and Communication (ISCC), (IEEE, Larnaca, 2015), pp. 180–187

    Chapter  Google Scholar 

  3. F.A. Alaba, M. Othman, I.A.T. Hashem, F. Alotaibi, Internet of Things security: A survey. J. Netw. Comput. Appl. 88, 10–28 (2017)

    Article  Google Scholar 

  4. P. Varga, J. Peto, A. Franko, D. Balla, D. Haja, F. Janky, et al., 5G support for industrial IoT applications–challenges, solutions, and research gaps. Sensors 20(3), 828 (2020)

    Article  Google Scholar 

  5. L. Liu, M. Han, Privacy and security issues in the 5G-enabled Internet of Things. 5G-Enabled Internet of Things, 241 (2019)

    Google Scholar 

  6. P. Sethi, S.R. Sarangi, Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1 (2017)

    Article  Google Scholar 

  7. P. Varga, S. Plosz, G. Soos, C. Hegedus, Security threats and issues in automation IoT, in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), (IEEE, Trondheim, 2017), pp. 1–6

    Google Scholar 

  8. R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, Internet of things (IoT) security: Current status, challenges and prospective measures, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), (IEEE, London, 2015), pp. 336–341

    Chapter  Google Scholar 

  9. W. Wei, A.T. Yang, W. Shi, K. Sha, Security in internet of things: Opportunities and challenges, in 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), (IEEE, Beijing, 2016), pp. 512–518

    Chapter  Google Scholar 

  10. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutorials 21(3), 2702–2733 (2019)

    Article  Google Scholar 

  11. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)

    Article  Google Scholar 

  12. A. Mosenia, N.K. Jha, A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586–602 (2016)

    Article  Google Scholar 

  13. Welcome to 5G: Privacy and security in a hyperconnected world, https://privacyinternational.org/long-read/3100/welcome-5g-privacy-and-security-hyperconnected-world-or-not

  14. M. Agiwal, N. Saxena, A. Roy, Towards connected living: 5G enabled internet of things (IoT). IETE Tech. Rev. 36(2), 190–202 (2019)

    Article  Google Scholar 

  15. D.M. West, How 5G technology enables the health internet of things. Brookings Center Technol. Innovation 3, 1–20 (2016)

    Google Scholar 

  16. A comparative introduction to 4G and 5G authentication, https://www.cablelabs.com/insights/a-comparative-introduction-to-4g-and-5g-authentication#:~:text=EAP%2DAKA’%20is%20another%20authentication,the%20UE%20 and%20the%20network

  17. Zeljka Zorz: 5G IoT security: Opportunity comes with risks, https://www.helpnetsecurity.com/2019/12/02/5g-iot-security/#:~:text=%E2%80%9CLarge%20numbers%20of%20vulnerable% 2C%205G,some%20aspect%20of%20the%20infrastructure.%E2%80%9D

  18. F.B. Saghezchi, G. Mantas, J. Ribeiro, M. Al-Rawi, S. Mumtaz, J. Rodriguez, Towards a secure network architecture for smart grids in 5G era, in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), (IEEE, Valencia, 2017), pp. 121–126

    Chapter  Google Scholar 

  19. B. Seok, J.C.S. Sicato, T. Erzhena, C. Xuan, Y. Pan, J.H. Park, Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl. Sci. 10(1), 217 (2020)

    Article  Google Scholar 

  20. T. Lagkas, V. Argyriou, S. Bibi, P. Sarigiannidis, UAV IoT framework views and challenges: Towards protecting drones as “things”. Sensors 18(11), 4015 (2018)

    Article  Google Scholar 

  21. D.H. Cruickshank, Security and privacy open issues in 5G connected IoT devices. Guildford, Surrey: Institute for Communication Systems (ICS), http://www.charisma5g.eu/wp-content/uploads/2016/07/Security-and-privacy-open-issues-in-the-5G-connected-IoT-devices.pdf

  22. Q.E. Ali, N. Ahmad, A.H. Malik, G. Ali, W.U. Rehman, Issues, challenges, and research opportunities in intelligent transport system for security and privacy. Appl. Sci. 8(10), 1964 (2018)

    Article  Google Scholar 

  23. N. Cranford, Understanding end-to-end network slicing for 5G (2018), https://www.rcrwireless.com/20180404/understanding-end-to-end-network-slicing-for-5g-tag27-tag99

  24. V.A. Cunha, E. da Silva, M.B. de Carvalho, D. Corujo, J.P. Barraca, D. Gomes, et al., Network slicing security: Challenges and directions. Internet Technol. Lett. 2(5), e125 (2019)

    Article  Google Scholar 

  25. Z. Kotulski, T.W. Nowak, M. Sepczuk, M. Tunia, R. Artych, K. Bocianiak, et al., Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018(1), 2 (2018)

    Article  Google Scholar 

  26. R. Borgaonkar, L. Hirschi, S. Park, A. Shaik, New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc. Privacy Enhancing Technol. 2019(3), 108–127 (2019)

    Article  Google Scholar 

  27. A. Koutsos, The 5G-AKA authentication protocol privacy, in 2019 IEEE European Symposium on Security and Privacy (EuroS&P), (IEEE, Stockholm, 2019), pp. 464–479

    Chapter  Google Scholar 

  28. D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, V. Stettler, A formal analysis of 5G authentication, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (ACM, Toronto, 2018), pp. 1383–1396

    Chapter  Google Scholar 

  29. A. Adeel, J. Ahmad, A. Hussain, Real-time lightweight chaotic encryption for 5G IoT enabled lip-reading driven secure hearing-aid. arXiv preprint arXiv:1809.04966 (2018)

    Google Scholar 

  30. Privacy international, https://privacyinternational.org/long-read/3100/welcome-5g-privacy-and-security-hyperconnected-world-or-not

  31. I. Mistry, S. Tanwar, S. Tyagi, N. Kumar, Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)

    Article  Google Scholar 

  32. A.K. Sikder, G. Petracca, H. Aksu, T. Jaeger, A.S. Uluagac, A survey on sensor-based threats to internet-of-things (IoT) devices and applications. arXiv:1802.02041 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. R. Mani Sekhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mani Sekhar, S.R., Nidhi Bhat, G., Vaishnavi, S., Siddesh, G.M. (2021). Security and Privacy in 5G-Enabled Internet of Things: A Data Analysis Perspective. In: Tanwar, S. (eds) Blockchain for 5G-Enabled IoT. Springer, Cham. https://doi.org/10.1007/978-3-030-67490-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67490-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67489-2

  • Online ISBN: 978-3-030-67490-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics