Abstract
The emerging 5G telecommunication technology uses novel aspects to fulfill the challenges of high data rate, ultralow latency, broad bandwidth with the best user experience. The essential use cases of 5G technology are eMBB, mMTC, and URLLC for quality of service and customer satisfaction. Internet of drones (IoD), smart agriculture, mobile edge computing, industry 4.0, digital twin, autonomous vehicles, remote surgery, cyber security, and enterprise transformation are some of the applications of 5G use cases. To implement these applications, a huge amount of sensors, machines, and devices are interconnected, and massive data will be generated on a real-time basis. This can be managed by cutting-edge technologies such as network slicing, massive MIMO with beamforming, loT and cloud computing, software-defined networking (SDN), network function virtualization (NFV), and cloud RAN. Since the 5G network is ultradense and heterogeneous (multitier), hence an extensive number of networks will be connected. This leads to the challenge of data and information security. Due to this security concern, user privacy becomes a vulnerable issue in 5G. This research work lists out the possible threats of 5G security and provides elucidation for it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://www.ericsson.com/en/mobility-report/articles/uplink-speed-and-slow-time-to-content
https://www.ericsson.com/en/security/a-guide-to-5g-network-security
G. Sahu, S.S. Pawar, Enhancing cost efficiency of femto cell by mobile traffic offloading, in 2019 IEEE 16th India Council International Conference (INDICON). https://doi.org/10.1109/INDICON47234.2019.9030275
M. Liyanage, I. Ahmad, A.B. Abro, A. Gurtov, M. Ylianttila, 5G WLAN Security, (Wiley Telecom), pp. 143–163. https://doi.org/10.1002/9781119293071.ch7
Q. Fang, Z. WeiJie, W. Guojun, F. Hui, Unified security architecture research for 5G wireless system, in 11th Web Information System and Application Conference, September 2014, China
N. Kshetri, J. Voas, 5G, security and you. Computer 53(3), 62–66 (2020). https://doi.org/10.1109/MC.2020.2966106
M. Soltani, W. Fatnassi, A. Bhuyan, Z. Rezki, P. Titus, Physical layer Security Analysis in The Priority-Based 5G Spectrum Sharing Systems, 2019 Resilience Week (RWS), November 2019, USA
V.H. Tea, 5G subscription concealed identifier (SUCI) of IMSI based subscription protection identifier(SUPI), privacy protected with ECIES profile a protection scheme, in IEEE Dtaport, p. 2020
G. Chopra, S. Jain, R.K. Jha, Possible security attack modeling in ultra dense networks using high speed handover management, in IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2017.2765004
https://www.ccsinsight.com/blog/hyperscalers-accelerate-the-5g-edge/
F. Pan, H. Wen, H. Song, T. Jie, L. Wang, 5G security architecture and light weight security authentication, in 2015 IEEE/CIC International Conference on Communications in China – Workshops (CIC/ICCC), (2015, November). https://doi.org/10.1109/ICCChinaW.2015.7961587
M. Liyanage, I. Ahmad, A.B. Abro, A. Gurtov, M. Ylianttila, Regulatory Impact on 5G Security and Privacy, pp. 399–419. https://doi.org/10.1002/9781119293071.ch17, copy right: 2017
J.J.H. Wang, Wideband wide-scan millimeter-wave phased arrays for enhanced security/privacy and performance in 5G mobile wireless, in 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, July 2017. https://doi.org/10.1109/APUSNCURSINRSM.2017.8072778
X. Liang, X. Qiu, A software defined security architecture for SDN-based 5G network, in 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), September 2016. https://doi.org/10.1109/ICNIDC.2016.7974528
M.A. Hasnat, S.T.A. Rumee, M.A. Razzaque, M. Mamun-Or-Rashid, Security study of 5G heterogeneous network: current solutions, limitations & future direction, in 2019 International Conference on Electrical, Computer and Communication Engineering, February 2019, Bangladesh. https://doi.org/10.1109/ECACE.2019.8679326
J.-H. Noh, H.-Y. Kwon, A study on smart city security policy based on blockchain in 5G age, in 2019 International Conference on Platform Technology and Service (PlatCon), January 2019. https://doi.org/10.1109/PlatCon.2019.8669406
J.J. Cao, M. Ma, H. Li, R. Ma, Y. Sun, P. Yu, L. Xiong, A survey on security aspects for 3GPP 5G networks. IEEE Commun. Surv. Tutor 22, 1 (2020)
G. Sahu, S.S. Pawar, Resource allocation using genetic algorithm in heterogeneous network, in 2019 IEEE Pune Section International Conference (PuneCon). https://doi.org/10.1109/PuneCon46936.2019.9105736
G. Chopra, R.K. Jha, S. Jain, Security issues in ultra dense network for 5G scenario, in 10th International Conference on Communication Systems & Networks (COMSNETS), January 2018, Bengaluru, India
G. Arfaoui, P. Bisson, R. Blom, R. Borgaonkar, H. Englund, E. Félix, F. Klaedtke, P.K. Nakarmi, M. Näslund, P. O’Hanlon, J. Papay, J. Suomalainen, M. Surridge, J.-P. Wary, A. Zahariev, A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018). https://doi.org/10.1109/ACCESS.2018.2827419
N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, K. Zeng, Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Int. Things J. 6(5), 8169–8181 (2019)
F. Liu, J. Peng, M. Zuo, Toward a secure access to 5G network, in 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, USA, September 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156
A. Mazin, K. Davaslioglu, R.D. Gitlin, Secure key management for 5G physical layer security, in IEEE 18th Wireless and Microwave Technology Conference (WAMICON), April 2017, USA
Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao, A survey of physical layer security techniques for 5G wireless networks and challenges ahead IEEE J. Select. Areas Commun., Volume: 36, Issue: 4, April 2018, Page(s): 679–695
Li Sun, Qinghe Du, “Physical layer security with its applications in 5G networks: A review”, China Commun., Volume: 14 , Issue: 12, December 2017, Page(s): 1–14, DOI: https://doi.org/10.1109/CC.2017.8246328
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sahu, G., Pawar, S.S. (2022). Security Challenges in 5G Network. In: Ghonge, M.M., Pramanik, S., Potgantwar, A.D. (eds) Software Defined Networking for Ad Hoc Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-91149-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-91149-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91148-5
Online ISBN: 978-3-030-91149-2
eBook Packages: EngineeringEngineering (R0)