Abstract
The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitigate emerging threats. This paper provides an exhaustive exploration of the 5G Security Threat Landscape investigating the intricacies of security challenges while harnessing innovative solutions to protect the IoT ecosystem. The study comprehensively unravels the diversity of security requirements, including critical aspects such as authentication, encryption, network slicing, and security by design, threat detection, and collaborative frameworks. By elucidating these foundational pillars, the paper highlights the interconnection between security paradigms and technological advancements, under scoring the pivotal role played by Artificial Intelligence (AI), Machine Learning (ML), and blockchain technologies in enhancing security measures. Through an integration of interdisciplinary research, the study emphasizes the imperative of synchronizing collective efforts among stakeholders to mitigate vulnerabilities and facilitate a secure IoT environment within the dynamic 5G landscape. As the technological landscape evolves, this research contributes to the ongoing research of securing the digital infrastructures, at par with researchers, practitioners, and policymakers, as they collectively set up a secure and resilient cyberspace.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Jain, A., Singh, T., Sharma, S. K., & Prajapati, V. (2021). Implementing security in IoT ecosystem using 5G network slicing and pattern matched intrusion detection system: a simulation study. Interdisciplinary Journal of Information, Knowledge, and Management, 16, 001–038.
Painuly, S., Kohli, P., Matta, P. & Sharma, S. (2020) Advance applications and future challenges of 5G IoT. 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 1381–1384. IEEE
Sethi, P., & Sarangi, S. R. (2017). Internet of things: architectures, protocols, and applications. Journal of Electrical and Computer Engineering, 1, 1–25.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54(15), 2787–2805.
Almeida, B. F. D., Mendes, L. L., Rodrigues, J. J., & Cruz, M. A. D. (2019). 5G waveforms for IoT applications. IEEE Communications Surveys & Tutorials, 21(3), 2554–2567.
Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., & Du, X. (2018). From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Communications Magazine, 56(10), 114–120.
Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (IoT) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access, 8, 23022–23040.
Ashton, K. (2015). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114.
López, P. (2005) Internet report 2005: the internet of things. ITU
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. & Gurtov, A. (2017) 5G security: analysis of threats and solutions. Conference on IEEE on Standards for Communications and Networking (CSCN), Finland, pp. 193–199
Lutkevich, B. & Beaver, K. (2021) What is a DDoS attack? Distributed denial-of-service attacks explained. SearchSecurity. Retrieved July 12, 2021, from https://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
Sharma, P. K., Rathore, S., & Park, J. H. (2019). Multilevel learning based modeling for link prediction and users’ consumption preference in online social networks. Future Generation Computer Systems, 93, 952–961.
Ficco, M., & Rak, M. (2014). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80–94.
Malware News, SIP-based DoS attack simulator: SIP-DAS (2017). Retrieved July 1, 2021, from https://malware.news/t/sip-based-dos-attack-simulator-sip-das/12413
Singh, S. K., & Tanwar, S. (2016). Analysis of software testing techniques: Theory to practical approach. Indian Journal of Science and Technology, 9(32), 1–5.
Xiong, B., Yang, K., Zhao, J., & Li, K. (2017). Robust dynamic network traffic partitioning against malicious attacks. Journal of Network and Computer Applications, 87, 20–31.
Gu, K., Wang, Y., & Wen, S. (2017). Traceable threshold proxy signature. Journal of Information Science & Engineering, 33(1), 63–79.
Mistry, I., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions and challenges. Mechanical Systems and Signal Processing, 135, 106382.
Akinyoade, A. J. & Eluwole, O. T. (2019) The Internet of things: definition, tactile-oriented vision, challenges and future research directions. 3rd International Congress on Information and Communication Technology, pp. 639–653. Springer, Singapore
Wazid, M., Das, A. K., Shetty, S., Gope, P., & Rodrigues, J. J. (2020). Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access, 9, 4466–4489.
Stallings, W. (2010). Cryptography and Network Security (5th ed.). Pearson Education Inc.
Sun, Y., Tian, Z., Li, M., Zhu, C., & Guizani, N. (2019). Automated attack and defense framework towards 5G security. IEEE Network, 34(5), 247–253.
Hassan, M. U., Rehmani, M. H., & Chen, J. (2020). Differential privacy techniques for cyber physical systems: a survey. IEEE Communications Surveys & Tutorials, 22(1), 746–789.
Riazi, M. S., Weinert, C., Tkachenko, O., Songhori, E. M., Schneider, T., & Koushanfar, F. (2018) Chameleon: a hybrid secure computation framework for machine learning applications. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 707–721
Tanuwidjaja, H. C., Choi, R. & Kim, K. (2020) A survey on deep learning techniques for privacy-preserving. International Conference on Machine Learning for Cyber Security, pp. 29–46. Springer, Cham
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2013). Network anomaly detection: methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.
Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2005). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.
Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., & Zhang, Y. (2019). Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network, 33(3), 10–17.
Luong, N. C., Hoang, D. T., Gong, S., Niyato, D., Wang, P., Liang, Y. C., & Kim, D. I. (2010). Applications of deep reinforcement learning in communications and networking: a survey. IEEE Communications Surveys & Tutorials, 21(4), 3133–3174.
Brumley, D., & Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.
Ferdowsi, A., Challita, U., Saad, W. & Mandayam, N. B. (2018) Robust deep reinforcement learning for security and safety in autonomous vehicle systems. 21st IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 307–312
Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials, 18(3), 2027–2051.
Ashraf, Q. M., & Habaebi, M. H. (2015). Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications, 49, 112–127.
Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: a survey. IEEE Communications Surveys & Tutorials, 21(3), 2224–2287.
Haddad, Z., Mahmoud, M., Saroit, I. A. & Taha, S. (2016) Secure and efficient uniform handover scheme for LTE-A networks. IEEE Wireless Communications and Networking Conference, pp. 1–6
Haider, N., Baig, M. Z. & Imran, M. (2020) Artificial intelligence and machine learning in 5G network security: opportunities, advantages, and future research trends. arXiv preprint arXiv:2007.04490
Burhan, M., Rehman, R. A., Khan, B., & Kim, B. S. (2018). IoT elements, layered architectures and security issues: a comprehensive survey. Sensors, 18(9), 2796.
Huawei. Huawei 5G Security White Paper. (2021). Retrieved August 30, 2021, from. https://www.huawei.com/en/trust-center/5g-cyber-security
Hussain, S. R., Echeverria, M., Chowdhury, O., Li, N. & Bertino, E. (2019) Privacy attacks to the 4g and 5g cellular paging protocols using side channel information. Network and Distributed Systems Security (NDSS) Symposium’19, San Diego, CA, USA
Hussain, S. R., Echeverria, M., Singla, A. & Chowdhury, O. (2019) Insecure connection bootstrapping in cellular networks: the root of all evil. 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM WiSec’19, Miami, FL, USA
Jover, R. P. & Reyes, G. D. L. (2018) AT&T Intellectual Property I LP. Cryptographically signing an access point device broadcast message. U.S. Patent 9,860,067
Krishnamoorthy, R., Soubache, I. D., & Jain, S. (2022). Wireless communication based evaluation of power consumption for constrained energy system. Wireless Personal Communications, 127(1), 737–748.
Krishnamoorthy, R., Kamala, K., Soubache, I. D., Karthik, M. V., & Begum, M. A. (2022). Integration of blockchain and artificial intelligence in smart city perspectives. In K. Vishal, J. Vishal, S. Bharti, M. C. Jyotir, & S. Rakesh (Eds.), Smart City Infrastructure (pp. 77–112). Wiley.
Krishnamoorthy, R., Desai, A., Patel, R., & Grover, A. (2021). 4 Element compact triple band MIMO antenna for sub-6 GHz 5G wireless applications. Wireless Networks, 27(6), 3747–3759.
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alanazi, M.N. 5G Security Threat Landscape, AI and Blockchain. Wireless Pers Commun 133, 1467–1482 (2023). https://doi.org/10.1007/s11277-023-10821-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10821-6