Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 585))

  • 286 Accesses

Abstract

Wireless systems have evolved and are becoming increasingly important because of their capacity and flexibility to support new services and technologies such as enhanced mobile broadband (eMBB), massive machine type communications (mMTC), massive internet of things (mIoT) and ultra-reliable low latency communications (URLLC). This paper presents a systematic review of the status of the fifth-generation or 5G wireless system, addresses its physical architecture as well as the service-based architecture. The main elements of network slicing as a different vision of 5G, in response to the need to split the physical network into multiple logical networks to serve various types of services based on different requirements. Software-defined networking (SDN) and network functions virtualization (NFV) are also presented as tools needed for network resource management. The main security challenges of 5G networks are analyzed and possible solutions are discussed. A comparative analysis is presented of 5G versus its 4G predecessor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Batalla, J.M., et al.: Security risk assessment for 5G networks: national perspective. IEEE Wirel. Commun. 27, 16–22 (2020). https://doi.org/10.1109/MWC.001.1900524

    Article  Google Scholar 

  2. Casado-Vara, R., Martin-del Rey, A., Affes, S., Prieto, J., Corchado, J.M.: IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. Future Gener. Comput. Syst. 102, 965–977 (2020). https://doi.org/10.1016/j.future.2019.09.042

    Article  Google Scholar 

  3. Barakabitze, A.A., Ahmad, A., Mijumbi, R., Hines, A.: 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput. Netw. 167, 106984 (2020). https://doi.org/10.1016/j.comnet.2019.106984

    Article  Google Scholar 

  4. Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: Overview of 5G security challenges and solutions. IEEE Commun. Stand Mag. 2, 36–43 (2018)

    Article  Google Scholar 

  5. Pérez-Pons, M.E., Parra-Domínguez, J., Chamoso, P., Plaza, M., Alonso, R.: Efficiency, profitability and productivity: technological applications in the agricultural sector. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J9 (2020). https://doi.org/10.14201/ADCAIJ2020944754

  6. Nono, R., Alsudais, R., Alshmrani, R., Alamoudi, S., Aljahdali, A.O.: Intelligent traffic light for ambulance clearance. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J9, 89–104 (2020). https://doi.org/10.14201/ADCAIJ20209389104

  7. González-Briones, A., Castellanos-Garzón, J.A., Mezquita Martín, Y., Prieto, J., Corchado, J.M.: A framework for knowledge discovery from wireless sensor networks in rural environments: a crop irrigation systems case study. Wirel. Commun. Mob. Comput. 2018, 1–14 (2018). https://doi.org/10.1155/2018/6089280

    Article  Google Scholar 

  8. Valdeolmillos, D., Mezquita, Y., Ludeiro, A.R.: Sensing as a service: an architecture proposal for big data environments in smart cities. In: Novais, P., Lloret, J., Chamoso, P., Carneiro, D., Navarro, E., Omatu, S. (eds.) ISAmI 2019. AISC, vol. 1006, pp. 97–104. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-24097-4_12

    Chapter  Google Scholar 

  9. Mezquita, Y.: Internet of Things platforms based on blockchain technology: a literature review. In: Herrera-Viedma, E., Vale, Z., Nielsen, P., Martin Del Rey, A., Casado Vara, R. (eds.) DCAI 2019. AISC, vol. 1004, pp. 205–208. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-23946-6_26

    Chapter  Google Scholar 

  10. Fourati, H., Maaloul, R., Chaari, L.: A survey of 5G network systems: challenges and machine learning approaches. Int. J. Mach. Learn. Cybern. 12(2), 385–431 (2020). https://doi.org/10.1007/s13042-020-01178-4

    Article  Google Scholar 

  11. Bo, R.: 5G Heterogeneous Networks Self-organizing and Optimization, 1st edn. Springer International Publishing, Cham (2016)

    Google Scholar 

  12. Llorens-Carrodeguas, A., Cervelló-Pastor, C., Leyva-Pupo, I.: Software defined networks and data distribution service as key features for the 5G control plane. In: Rodríguez, S., et al. (eds.) DCAI 2018. AISC, vol. 801, pp. 357–360. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-99608-0_45

    Chapter  Google Scholar 

  13. Yousaf, F.Z., Bredel, M., Schaller, S., Schneider, F.: NFV and SDN—key technology enablers for 5G networks. IEEE J. Sel. Areas Commun. 35, 2468–2478 (2017). https://doi.org/10.1109/JSAC.2017.2760418

    Article  Google Scholar 

  14. Leyva-Pupo, I., Cervelló-Pastor, C., Llorens-Carrodeguas, A.: The resources placement problem in a 5G hierarchical SDN control plane. In: Rodríguez, S., et al. (eds.) DCAI 2018. AISC, vol. 801, pp. 370–373. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-99608-0_48

    Chapter  Google Scholar 

  15. Mazurczyk, W., Bisson, P., Jover, R.P., Nakao, K., Cabaj, K.: Special issue on advancements in 5G networks security. Future Gener. Comput. Syst. 110, 314–316 (2020). https://doi.org/10.1016/j.future.2020.04.043

    Article  Google Scholar 

  16. Márquez Sánchez, S.: Integral support predictive platform for industry 4.0. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J9, 71–82 (2020). https://doi.org/10.14201/ADCAIJ2020947182

  17. Chamoso, P., González-Briones, A., De La Prieta, F., Venyagamoorthy, G.K., Corchado, J.M.: Smart city as a distributed platform: toward a system for citizen-oriented management. Comput. Commun. 152, 323–332 (2020). https://doi.org/10.1016/j.comcom.2020.01.059

    Article  Google Scholar 

  18. Ahmad, P.: A review on blockchain’s applications and implementations. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J10 (2021). https://doi.org/10.14201/ADCAIJ2021102197208

  19. Parra Domínguez, J., Roseiro, P.: Blockchain: a brief review of agri-food supply chain solutions and opportunities. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J9, 95–106 (2020). https://doi.org/10.14201/ADCAIJ20209495106

  20. Rathore, S., Park, J.H., Chang, H.: Deep Learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access 9, 90075–90083 (2021). https://doi.org/10.1109/ACCESS.2021.3077069

    Article  Google Scholar 

  21. Srivastav, R.K., Agrawal, D., Shrivastava, A.: A survey on vulnerabilities and performance evaluation criteria in blockchain technology. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J9, 91–105 (2020). https://doi.org/10.14201/ADCAIJ20209291105

  22. Casado-Vara, R., de la Prieta, F., Prieto, J., Corchado, J.M.: Blockchain framework for IoT data quality via edge computing. In: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems. ACM, Shenzhen China, pp. 19–24 (2018)

    Google Scholar 

  23. Marais, B., Quertier, T., Chesneau, C.: Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability (2021)

    Google Scholar 

  24. Alonso, R.S.: Deep symbolic learning and semantics for an explainable and ethical artificial intelligence. In: Novais, P., Vercelli, G., Larriba-Pey, J.L., Herrera, F., Chamoso, P. (eds.) ISAmI 2020. AISC, vol. 1239, pp. 272–278. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-58356-9_30

    Chapter  Google Scholar 

  25. Sittón-Candanedo, I.: A new approach: edge computing and blockchain for industry 4.0. In: Herrera-Viedma, E., Vale, Z., Nielsen, P., Martin Del Rey, A., Casado Vara, R. (eds.) DCAI 2019. AISC, vol. 1004, pp. 201–204. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-23946-6_25

    Chapter  Google Scholar 

  26. Sittón-Candanedo, I.: Edge computing: a review of application scenarios. In: Herrera-Viedma, E., Vale, Z., Nielsen, P., Martin Del Rey, A., Casado Vara, R. (eds.) DCAI 2019. AISC, vol. 1004, pp. 197–200. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-23946-6_24

    Chapter  Google Scholar 

  27. Chen, W.-H., Kuo, H.-Y., Lin, Y.-C., Tsai, C.-H.: A lightweight pedestrian detection model for edge computing systems. In: Dong, Y., Herrera-Viedma, E., Matsui, K., Omatsu, S., González Briones, A., Rodríguez González, S. (eds.) DCAI 2020. AISC, vol. 1237, pp. 102–112. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-53036-5_11

    Chapter  Google Scholar 

  28. Plaza-Hernández, M., Gil-González, A.B., Rodríguez-González, S., Prieto-Tejedor, J., Corchado-Rodríguez, J.M.: Integration of IoT technologies in the maritime industry. In: Rodríguez González, S., et al. (eds.) DCAI 2020. AISC, vol. 1242, pp. 107–115. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-53829-3_10

    Chapter  Google Scholar 

  29. Park, J.H., Rathore, S., Singh, S.K., Salim, M.M., Azzaoui, A.E., Kim, T.W., Pan, Y., Park, J.H.: A Comprehensive Survey on Core Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions, p. 23 (2021)

    Google Scholar 

  30. Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., Ylianttila, M.: Security for 5G and Beyond 21, 41 (2019)

    Google Scholar 

  31. Abdulqadder, I.H., Zhou, S., Zou, D., Aziz, I.T., Akber, S.M.A.: Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Comput. Netw. 179, 107364 (2020). https://doi.org/10.1016/j.comnet.2020.107364

    Article  Google Scholar 

  32. Benzaïd, C., Taleb, T.: AI for beyond 5G networks: a cyber-security defense or offense enabler? IEEE Netw. 34, 140–147 (2020). https://doi.org/10.1109/MNET.011.2000088

    Article  Google Scholar 

  33. Khan, R., Kumar, P., Jayakody, D.N.K., Liyanage, M.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor 22, 196–248 (2020). https://doi.org/10.1109/COMST.2019.2933899

    Article  Google Scholar 

  34. Benzaid, C., Taleb, T.: AI for beyond 5G networks: a cyber-security defense or offense enabler? IEEE Netw. 34, 140–147 (2020). https://doi.org/10.1109/MNET.011.2000088

    Article  Google Scholar 

  35. Yigitcanlar, T., et al.: Artificial intelligence technologies and related urban planning and development concepts: how are they perceived and utilized in Australia? J. Open Innov. Technol. Mark Complex 6, 187 (2020). https://doi.org/10.3390/joitmc6040187

    Article  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by the Institute for Business Competitiveness of Castilla y León, and the European Regional Development Fund under grant CCTT3/20/SA/0002 (AIR-SCity project).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlos D. Aguilar-Mora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aguilar-Mora, C.D. (2023). Overview: Security in 5G Wireless Systems. In: Machado, J.M., et al. Distributed Computing and Artificial Intelligence, Special Sessions, 19th International Conference. DCAI 2022. Lecture Notes in Networks and Systems, vol 585. Springer, Cham. https://doi.org/10.1007/978-3-031-23210-7_13

Download citation

Publish with us

Policies and ethics