Skip to main content

5G Network Security for IoT Implementation: A Systematic Literature Review

  • Conference paper
  • First Online:
Book cover Innovation and Research (CI3 2020)

Abstract

Fifth generation (5G) wireless technologies satisfies the growing demand for the Internet of Things (IoT), however, IoT devices are vulnerable to security threats due to the simplicity of their hardware and communication protocols, which imply possible attacks and security challenges. In this work we propose to conduct a systematic review of literature that relates 5G technologies to the internet of things and approach the security that the 5G network for IoT must provide. The Torres – Carrión method is used, raising four research questions: a) information security services, b) types of attacks in 5G-IoT, c) security in the layers of the IoT network architecture, d) strategies for 5G-IoT network security. Semantic search criteria were applied, in the Scopus database, obtaining 23 articles from 18 journals, the main studies were collected, it is evident that the blockchain is an efficient security mechanism that merits further study, that the physical layer is the one that receives the most active and passive attacks, such as denial of service (DoS) that is studied by several authors, together with mechanisms, architectures, protocols and algorithms that provide the security services of a mobile network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amiruddin, A., Ratna, A.A.P., Sari, R.F.: Systematic review of internet of things security. Int. J. Commun. Networks Inf. Secur. 11, 248–255 (2019)

    Google Scholar 

  2. Zhang, S., Wang, Y., Zhou, W.: Towards secure 5G networks: a survey. Comput. Networks. 162, 106871 (2019). https://doi.org/10.1016/j.comnet.2019.106871

    Article  Google Scholar 

  3. Gafurov, K., Chung, T.M.: Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J. Inf. Process. Syst. 15, 797–819 (2019). https://doi.org/10.3745/JIPS.03.0125

    Article  Google Scholar 

  4. Stallings, W.: Cryptography and Network Security Principles and practice, 5th edn. Prentice Hall, Upper Saddle River (2011)

    Google Scholar 

  5. Calder, A.: Information Security based on ISO 27001/ISO 27002. van Haren Publishing, Hertogenbosch (2009)

    Google Scholar 

  6. Torres-Carrion, P.V., Gonzalez-Gonzalez, C.S., Aciar, S., Rodriguez-Morales, G.: Methodology for systematic literature review applied to engineering and education. In: IEEE Global Engineering Education Conference, EDUCON, pp. 1364–1373. IEEE Computer Society (2018)

    Google Scholar 

  7. Gurusamy, D., Deva Priya, M., Yibgeta, B., Bekalu, A.: DDoS risk in 5G enabled iot and solutions. Int. J. Eng. Adv. Technol. 8, 1574–1578 (2019)

    Google Scholar 

  8. Li, S., Xu, L. Da, Zhao, S.: 5G Internet of Things: A survey (2018). https://linkinghub.elsevier.com/retrieve/pii/S2452414X18300037

  9. Liyanage, M., Ahmad, I., Abro, A.B., Gurtov, A., Ylianttila, M.: A Comprehensive Guide to 5G Security. Wiley, Hoboken (2018)

    Book  Google Scholar 

  10. Iso.org: ISO/IEC 30141:2018(en), Internet of Things (loT)—Reference Architecture. https://www.iso.org/obp/ui/es/#iso:std:iso-iec:30141:ed-1:v1:en

  11. thesaurus.com: Thesaurus. https://www.thesaurus.com

  12. Wang, H.: IEEE Internet Things J. https://ieeexplore.ieee.org/xpl/aboutJournal.jsp?punumber=6488907

  13. Romero Castro, M.I., Figueroa Morán, G.L., Vera Navarrete, D.S., Álava Cruzatty, J.E., Parrales Anzúles, G.R., Álava Mero, C.J., Murillo Quimiz, Á.L., Castillo Merino, M.A.: Introducción a la seguridad informática y el análisis de vulnerabilidades (2018)

    Google Scholar 

  14. Chaudhuri, A.: Internet of Things, for Things, and by Things. CRC Press, Boca Raton (2018)

    Book  Google Scholar 

  15. UIT: La seguridad de las telecomunicaciones y las tecnologías de la información. 136 (2006)

    Google Scholar 

  16. Ouaissa, M., Ouaissa, M., Rhattoy, A.: An efficient and secure authentication and key agreement protocol of LTE mobile network for an IoT system. Int. J. Intell. Eng. Syst. 12, 212–222 (2019). https://doi.org/10.22266/ijies2019.0831.20

    Article  Google Scholar 

  17. Heigl, M., Doerr, L., Tiefnig, N., Fiala, D., Schramm, M.: A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection. Comput. Secur. 85, 270–287 (2019). https://doi.org/10.1016/j.cose.2019.05.010

    Article  Google Scholar 

  18. Fang, D., Qian, Y., Hu, R.Q.: Security for 5G mobile wireless networks. IEEE Access. 6, 4850–4874 (2017). https://doi.org/10.1109/ACCESS.2017.2779146

    Article  Google Scholar 

  19. Militano, L., Orsino, A., Araniti, G., Iera, A.: NB-IoT for D2D-enhanced content uploading with social trustworthiness in 5G systems. Fut. Internet. 9, 31 (2017). https://doi.org/10.3390/fi9030031

    Article  Google Scholar 

  20. Santos, A.L., Cervantes, C.A.V., Nogueira, M., Kantarci, B.: Clustering and reliability-driven mitigation of routing attacks in massive IoT systems. J. Internet Serv. Appl. 10, 18 (2019). https://doi.org/10.1186/s13174-019-0117-8

    Article  Google Scholar 

  21. Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., Zeng, K.: Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J. 6, 8169–8181 (2019). https://doi.org/10.1109/JIOT.2019.2927379

    Article  Google Scholar 

  22. Nieto, A., Acien, A., Fernandez, G.: Crowdsourcing analysis in 5G IoT: cybersecurity threats and mitigation. Mob. Networks Appl. 24, 881–889 (2019). https://doi.org/10.1007/s11036-018-1146-4

    Article  Google Scholar 

  23. Cao, J., Yu, P., Ma, M., Gao, W.: Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J. 6, 1561–1575 (2019). https://doi.org/10.1109/JIOT.2018.2846803

    Article  Google Scholar 

  24. Xu, L., Chen, J., Liu, M., Wang, X.: Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8, 146 (2019). https://doi.org/10.3390/electronics8020146

    Article  Google Scholar 

  25. Sharma, V., You, I., Leu, F.Y., Atiquzzaman, M.: Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102, 38–57 (2018). https://doi.org/10.1016/j.jnca.2017.11.004

    Article  Google Scholar 

  26. Arul, R., Raja, G., Almagrabi, A.O., Alkatheiri, M.S., Chauhdary, S.H., Bashir, A.K.: A quantum-safe key hierarchy and dynamic security association for LTE/SAE in 5G scenario. IEEE Trans. Ind. Informatics. 16, 681–690 (2020). https://doi.org/10.1109/TII.2019.2949354

    Article  Google Scholar 

  27. Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the Internet of Things. Secur. Commun. Networks. 9, 3083–3094 (2016). https://doi.org/10.1002/sec.1259

    Article  Google Scholar 

  28. Safkhani, M., Shariat, M.: Implementation of secret disclosure attack against two IoT lightweight authentication protocols. J. Supercomput. 74, 6220–6235 (2018). https://doi.org/10.1007/s11227-018-2538-8

    Article  Google Scholar 

  29. Salva-Garcia, P., Alcaraz-Calero, J.M., Wang, Q., Bernabe, J.B., Skarmeta, A.: 5G NB-IoT: efficient network traffic filtering for multitenant IoT cellular networks. Secur. Commun. Netw. 2018, 1–21 (2018). https://doi.org/10.1155/2018/9291506

    Article  Google Scholar 

  30. Fu, Y., Yan, Z., Cao, J., Koné, O., Cao, X.: An automata based intrusion detection method for Internet of Things. Mob. Inf. Syst. 2017, 1–13 (2017). https://doi.org/10.1155/2017/1750637

    Article  Google Scholar 

  31. Zhang, S., Xu, X., Peng, J., Huang, K., Li, Z.: Physical layer security in massive internet of things: delay and security analysis. IET Commun. 13, 93–98 (2019). https://doi.org/10.1049/iet-com.2018.5570

    Article  Google Scholar 

  32. Memon, M.L., Saxena, N., Roy, A., Shin, D.R.: Backscatter communications: inception of the battery-free era—a comprehensive survey. Electronics 8, 2–129 (2019). https://doi.org/10.3390/electronics8020129

    Article  Google Scholar 

  33. Dai, H.N., Zheng, Z., Zhang, Y.: Blockchain for Internet of Things: a survey. IEEE Internet Things J. 6, 8076–8094 (2019). https://doi.org/10.1109/JIOT.2019.2920987

    Article  Google Scholar 

  34. Ni, J., Lin, X., Shen, X.S.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36, 644–657 (2018). https://doi.org/10.1109/JSAC.2018.2815418

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Montaño-Blacio, M., Briceño-Sarmiento, J., Pesántez-Bravo, F. (2021). 5G Network Security for IoT Implementation: A Systematic Literature Review. In: Botto-Tobar, M., Zambrano Vizuete, M., Díaz Cadena, A. (eds) Innovation and Research. CI3 2020. Advances in Intelligent Systems and Computing, vol 1277. Springer, Cham. https://doi.org/10.1007/978-3-030-60467-7_3

Download citation

Publish with us

Policies and ethics