Skip to main content
Log in

5G Security Threat Landscape, AI and Blockchain

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitigate emerging threats. This paper provides an exhaustive exploration of the 5G Security Threat Landscape investigating the intricacies of security challenges while harnessing innovative solutions to protect the IoT ecosystem. The study comprehensively unravels the diversity of security requirements, including critical aspects such as authentication, encryption, network slicing, and security by design, threat detection, and collaborative frameworks. By elucidating these foundational pillars, the paper highlights the interconnection between security paradigms and technological advancements, under scoring the pivotal role played by Artificial Intelligence (AI), Machine Learning (ML), and blockchain technologies in enhancing security measures. Through an integration of interdisciplinary research, the study emphasizes the imperative of synchronizing collective efforts among stakeholders to mitigate vulnerabilities and facilitate a secure IoT environment within the dynamic 5G landscape. As the technological landscape evolves, this research contributes to the ongoing research of securing the digital infrastructures, at par with researchers, practitioners, and policymakers, as they collectively set up a secure and resilient cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Jain, A., Singh, T., Sharma, S. K., & Prajapati, V. (2021). Implementing security in IoT ecosystem using 5G network slicing and pattern matched intrusion detection system: a simulation study. Interdisciplinary Journal of Information, Knowledge, and Management, 16, 001–038.

    Article  Google Scholar 

  2. Painuly, S., Kohli, P., Matta, P. & Sharma, S. (2020) Advance applications and future challenges of 5G IoT. 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 1381–1384. IEEE

  3. Sethi, P., & Sarangi, S. R. (2017). Internet of things: architectures, protocols, and applications. Journal of Electrical and Computer Engineering, 1, 1–25.

    Article  Google Scholar 

  4. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  5. Almeida, B. F. D., Mendes, L. L., Rodrigues, J. J., & Cruz, M. A. D. (2019). 5G waveforms for IoT applications. IEEE Communications Surveys & Tutorials, 21(3), 2554–2567.

    Article  Google Scholar 

  6. Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., & Du, X. (2018). From IoT to 5G I-IoT: the next generation IoT-based intelligent algorithms and 5G technologies. IEEE Communications Magazine, 56(10), 114–120.

    Article  CAS  Google Scholar 

  7. Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (IoT) for next-generation smart systems: a review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access, 8, 23022–23040.

    Article  Google Scholar 

  8. Ashton, K. (2015). That ‘internet of things’ thing. RFID Journal, 22(7), 97–114.

    Google Scholar 

  9. López, P. (2005) Internet report 2005: the internet of things. ITU

  10. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. & Gurtov, A. (2017) 5G security: analysis of threats and solutions. Conference on IEEE on Standards for Communications and Networking (CSCN), Finland, pp. 193–199

  11. Lutkevich, B. & Beaver, K. (2021) What is a DDoS attack? Distributed denial-of-service attacks explained. SearchSecurity. Retrieved July 12, 2021, from https://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack

  12. Sharma, P. K., Rathore, S., & Park, J. H. (2019). Multilevel learning based modeling for link prediction and users’ consumption preference in online social networks. Future Generation Computer Systems, 93, 952–961.

    Article  Google Scholar 

  13. Ficco, M., & Rak, M. (2014). Stealthy denial of service strategy in cloud computing. IEEE Transactions on Cloud Computing, 3(1), 80–94.

    Article  Google Scholar 

  14. Malware News, SIP-based DoS attack simulator: SIP-DAS (2017). Retrieved July 1, 2021, from https://malware.news/t/sip-based-dos-attack-simulator-sip-das/12413

  15. Singh, S. K., & Tanwar, S. (2016). Analysis of software testing techniques: Theory to practical approach. Indian Journal of Science and Technology, 9(32), 1–5.

    Article  Google Scholar 

  16. Xiong, B., Yang, K., Zhao, J., & Li, K. (2017). Robust dynamic network traffic partitioning against malicious attacks. Journal of Network and Computer Applications, 87, 20–31.

    Article  Google Scholar 

  17. Gu, K., Wang, Y., & Wen, S. (2017). Traceable threshold proxy signature. Journal of Information Science & Engineering, 33(1), 63–79.

    MathSciNet  Google Scholar 

  18. Mistry, I., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions and challenges. Mechanical Systems and Signal Processing, 135, 106382.

    Article  Google Scholar 

  19. Akinyoade, A. J. & Eluwole, O. T. (2019) The Internet of things: definition, tactile-oriented vision, challenges and future research directions. 3rd International Congress on Information and Communication Technology, pp. 639–653. Springer, Singapore

  20. Wazid, M., Das, A. K., Shetty, S., Gope, P., & Rodrigues, J. J. (2020). Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access, 9, 4466–4489.

    Article  Google Scholar 

  21. Stallings, W. (2010). Cryptography and Network Security (5th ed.). Pearson Education Inc.

    Google Scholar 

  22. Sun, Y., Tian, Z., Li, M., Zhu, C., & Guizani, N. (2019). Automated attack and defense framework towards 5G security. IEEE Network, 34(5), 247–253.

    Article  Google Scholar 

  23. Hassan, M. U., Rehmani, M. H., & Chen, J. (2020). Differential privacy techniques for cyber physical systems: a survey. IEEE Communications Surveys & Tutorials, 22(1), 746–789.

    Article  Google Scholar 

  24. Riazi, M. S., Weinert, C., Tkachenko, O., Songhori, E. M., Schneider, T., & Koushanfar, F. (2018) Chameleon: a hybrid secure computation framework for machine learning applications. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 707–721

  25. Tanuwidjaja, H. C., Choi, R. & Kim, K. (2020) A survey on deep learning techniques for privacy-preserving. International Conference on Machine Learning for Cyber Security, pp. 29–46. Springer, Cham

  26. Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2013). Network anomaly detection: methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.

    Article  Google Scholar 

  27. Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2005). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541–552.

    Article  MathSciNet  Google Scholar 

  28. Dai, Y., Xu, D., Maharjan, S., Chen, Z., He, Q., & Zhang, Y. (2019). Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network, 33(3), 10–17.

    Article  Google Scholar 

  29. Luong, N. C., Hoang, D. T., Gong, S., Niyato, D., Wang, P., Liang, Y. C., & Kim, D. I. (2010). Applications of deep reinforcement learning in communications and networking: a survey. IEEE Communications Surveys & Tutorials, 21(4), 3133–3174.

    Article  Google Scholar 

  30. Brumley, D., & Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.

    Article  ADS  Google Scholar 

  31. Ferdowsi, A., Challita, U., Saad, W. & Mandayam, N. B. (2018) Robust deep reinforcement learning for security and safety in autonomous vehicle systems. 21st IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 307–312

  32. Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials, 18(3), 2027–2051.

    Article  Google Scholar 

  33. Ashraf, Q. M., & Habaebi, M. H. (2015). Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications, 49, 112–127.

    Article  Google Scholar 

  34. Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: a survey. IEEE Communications Surveys & Tutorials, 21(3), 2224–2287.

    Article  Google Scholar 

  35. Haddad, Z., Mahmoud, M., Saroit, I. A. & Taha, S. (2016) Secure and efficient uniform handover scheme for LTE-A networks. IEEE Wireless Communications and Networking Conference, pp. 1–6

  36. Haider, N., Baig, M. Z. & Imran, M. (2020) Artificial intelligence and machine learning in 5G network security: opportunities, advantages, and future research trends. arXiv preprint arXiv:2007.04490

  37. Burhan, M., Rehman, R. A., Khan, B., & Kim, B. S. (2018). IoT elements, layered architectures and security issues: a comprehensive survey. Sensors, 18(9), 2796.

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  38. Huawei. Huawei 5G Security White Paper. (2021). Retrieved August 30, 2021, from. https://www.huawei.com/en/trust-center/5g-cyber-security

  39. Hussain, S. R., Echeverria, M., Chowdhury, O., Li, N. & Bertino, E. (2019) Privacy attacks to the 4g and 5g cellular paging protocols using side channel information. Network and Distributed Systems Security (NDSS) Symposium’19, San Diego, CA, USA

  40. Hussain, S. R., Echeverria, M., Singla, A. & Chowdhury, O. (2019) Insecure connection bootstrapping in cellular networks: the root of all evil. 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM WiSec19, Miami, FL, USA

  41. Jover, R. P. & Reyes, G. D. L. (2018) AT&T Intellectual Property I LP. Cryptographically signing an access point device broadcast message. U.S. Patent 9,860,067

  42. Krishnamoorthy, R., Soubache, I. D., & Jain, S. (2022). Wireless communication based evaluation of power consumption for constrained energy system. Wireless Personal Communications, 127(1), 737–748.

    Article  Google Scholar 

  43. Krishnamoorthy, R., Kamala, K., Soubache, I. D., Karthik, M. V., & Begum, M. A. (2022). Integration of blockchain and artificial intelligence in smart city perspectives. In K. Vishal, J. Vishal, S. Bharti, M. C. Jyotir, & S. Rakesh (Eds.), Smart City Infrastructure (pp. 77–112). Wiley.

    Chapter  Google Scholar 

  44. Krishnamoorthy, R., Desai, A., Patel, R., & Grover, A. (2021). 4 Element compact triple band MIMO antenna for sub-6 GHz 5G wireless applications. Wireless Networks, 27(6), 3747–3759.

    Article  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad N. Alanazi.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alanazi, M.N. 5G Security Threat Landscape, AI and Blockchain. Wireless Pers Commun 133, 1467–1482 (2023). https://doi.org/10.1007/s11277-023-10821-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10821-6

Keywords

Navigation