Skip to main content

Security Challenges in 5G Network

  • Chapter
  • First Online:
Software Defined Networking for Ad Hoc Networks

Abstract

The emerging 5G telecommunication technology uses novel aspects to fulfill the challenges of high data rate, ultralow latency, broad bandwidth with the best user experience. The essential use cases of 5G technology are eMBB, mMTC, and URLLC for quality of service and customer satisfaction. Internet of drones (IoD), smart agriculture, mobile edge computing, industry 4.0, digital twin, autonomous vehicles, remote surgery, cyber security, and enterprise transformation are some of the applications of 5G use cases. To implement these applications, a huge amount of sensors, machines, and devices are interconnected, and massive data will be generated on a real-time basis. This can be managed by cutting-edge technologies such as network slicing, massive MIMO with beamforming, loT and cloud computing, software-defined networking (SDN), network function virtualization (NFV), and cloud RAN. Since the 5G network is ultradense and heterogeneous (multitier), hence an extensive number of networks will be connected. This leads to the challenge of data and information security. Due to this security concern, user privacy becomes a vulnerable issue in 5G. This research work lists out the possible threats of 5G security and provides elucidation for it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://www.ericsson.com/en/mobility-report/articles/uplink-speed-and-slow-time-to-content

  2. https://www.ericsson.com/en/security/a-guide-to-5g-network-security

  3. G. Sahu, S.S. Pawar, Enhancing cost efficiency of femto cell by mobile traffic offloading, in 2019 IEEE 16th India Council International Conference (INDICON). https://doi.org/10.1109/INDICON47234.2019.9030275

  4. https://5gobservatory.eu/info-deployments/5g-performance/

  5. M. Liyanage, I. Ahmad, A.B. Abro, A. Gurtov, M. Ylianttila, 5G WLAN Security, (Wiley Telecom), pp. 143–163. https://doi.org/10.1002/9781119293071.ch7

  6. Q. Fang, Z. WeiJie, W. Guojun, F. Hui, Unified security architecture research for 5G wireless system, in 11th Web Information System and Application Conference, September 2014, China

    Google Scholar 

  7. N. Kshetri, J. Voas, 5G, security and you. Computer 53(3), 62–66 (2020). https://doi.org/10.1109/MC.2020.2966106

    Article  Google Scholar 

  8. M. Soltani, W. Fatnassi, A. Bhuyan, Z. Rezki, P. Titus, Physical layer Security Analysis in The Priority-Based 5G Spectrum Sharing Systems, 2019 Resilience Week (RWS), November 2019, USA

    Google Scholar 

  9. V.H. Tea, 5G subscription concealed identifier (SUCI) of IMSI based subscription protection identifier(SUPI), privacy protected with ECIES profile a protection scheme, in IEEE Dtaport, p. 2020

    Google Scholar 

  10. G. Chopra, S. Jain, R.K. Jha, Possible security attack modeling in ultra dense networks using high speed handover management, in IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2017.2765004

  11. https://www.ccsinsight.com/blog/hyperscalers-accelerate-the-5g-edge/

  12. F. Pan, H. Wen, H. Song, T. Jie, L. Wang, 5G security architecture and light weight security authentication, in 2015 IEEE/CIC International Conference on Communications in China – Workshops (CIC/ICCC), (2015, November). https://doi.org/10.1109/ICCChinaW.2015.7961587

  13. M. Liyanage, I. Ahmad, A.B. Abro, A. Gurtov, M. Ylianttila, Regulatory Impact on 5G Security and Privacy, pp. 399–419. https://doi.org/10.1002/9781119293071.ch17, copy right: 2017

  14. J.J.H. Wang, Wideband wide-scan millimeter-wave phased arrays for enhanced security/privacy and performance in 5G mobile wireless, in 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, July 2017. https://doi.org/10.1109/APUSNCURSINRSM.2017.8072778

  15. X. Liang, X. Qiu, A software defined security architecture for SDN-based 5G network, in 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), September 2016. https://doi.org/10.1109/ICNIDC.2016.7974528

  16. M.A. Hasnat, S.T.A. Rumee, M.A. Razzaque, M. Mamun-Or-Rashid, Security study of 5G heterogeneous network: current solutions, limitations & future direction, in 2019 International Conference on Electrical, Computer and Communication Engineering, February 2019, Bangladesh. https://doi.org/10.1109/ECACE.2019.8679326

  17. J.-H. Noh, H.-Y. Kwon, A study on smart city security policy based on blockchain in 5G age, in 2019 International Conference on Platform Technology and Service (PlatCon), January 2019. https://doi.org/10.1109/PlatCon.2019.8669406

  18. J.J. Cao, M. Ma, H. Li, R. Ma, Y. Sun, P. Yu, L. Xiong, A survey on security aspects for 3GPP 5G networks. IEEE Commun. Surv. Tutor 22, 1 (2020)

    Article  Google Scholar 

  19. G. Sahu, S.S. Pawar, Resource allocation using genetic algorithm in heterogeneous network, in 2019 IEEE Pune Section International Conference (PuneCon). https://doi.org/10.1109/PuneCon46936.2019.9105736

  20. G. Chopra, R.K. Jha, S. Jain, Security issues in ultra dense network for 5G scenario, in 10th International Conference on Communication Systems & Networks (COMSNETS), January 2018, Bengaluru, India

    Google Scholar 

  21. G. Arfaoui, P. Bisson, R. Blom, R. Borgaonkar, H. Englund, E. Félix, F. Klaedtke, P.K. Nakarmi, M. Näslund, P. O’Hanlon, J. Papay, J. Suomalainen, M. Surridge, J.-P. Wary, A. Zahariev, A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018). https://doi.org/10.1109/ACCESS.2018.2827419

    Article  Google Scholar 

  22. N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, K. Zeng, Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Int. Things J. 6(5), 8169–8181 (2019)

    Article  Google Scholar 

  23. F. Liu, J. Peng, M. Zuo, Toward a secure access to 5G network, in 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, USA, September 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156

  24. A. Mazin, K. Davaslioglu, R.D. Gitlin, Secure key management for 5G physical layer security, in IEEE 18th Wireless and Microwave Technology Conference (WAMICON), April 2017, USA

    Google Scholar 

  25. Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao, A survey of physical layer security techniques for 5G wireless networks and challenges ahead IEEE J. Select. Areas Commun., Volume: 36, Issue: 4, April 2018, Page(s): 679–695

    Google Scholar 

  26. Li Sun, Qinghe Du, “Physical layer security with its applications in 5G networks: A review”, China Commun., Volume: 14 , Issue: 12, December 2017, Page(s): 1–14, DOI: https://doi.org/10.1109/CC.2017.8246328

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sahu, G., Pawar, S.S. (2022). Security Challenges in 5G Network. In: Ghonge, M.M., Pramanik, S., Potgantwar, A.D. (eds) Software Defined Networking for Ad Hoc Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-91149-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91149-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91148-5

  • Online ISBN: 978-3-030-91149-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics