Skip to main content

Approaches and Methods for Regulation of Security Risks in 5G and 6G

  • Chapter
  • First Online:
Wireless Networks

Abstract

The proliferation of technology is now exponential. Developments in technology, the increase in computer power and the reduction of cost, has allowed for greater accessibility, use and implementation of this technology in all sectors and industries. The evolution of smart and autonomous technologies, such as artificial intelligence and machine learning, has enabled traditionally labour intensive data analytical tasks to be conducted, quickly and efficiently. Multiple datasets and data lakes that have been siloed, are now being utilised and interconnected. Digital twin, AI, metaverse, virtual technologies are being immersed into all sectors and more importantly merged into humans where the line between reality and virtual are seeming to be the same. However, in order to succeed utilising these amazing and emerging technologies, it means that there has to be an incredible backbone and capacity to carry data; and instantaneously delivery at high speed and securely. 5G is already in its rollout and has to achieve its objectives in order for 6G to be fully onboarded and implemented in a methodical manner. The European Commission has 5G objectives and is applying funding for strategic initiatives, such as Horizon 2020. There are huge benefits for all with 5G/6G but only if they are implemented in a manner that decreases the risk they can pose to security, privacy and trust, which are core pillars that must be maintained. Smart cities will mean the data that is being collected can be analysed and in the wrong hands it poses security risks to the data/individual/nation. With such an intertwining of technologies interacting with humans and the abundance of IoT and eIoT in smart cities, there has to be a clear governance plan in place and way to manage 5G/6G to ensure success. This chapter explains the 5G/6G background, risks, benefits and highlights the need for robust governance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rodriguez J (2015) Fundamentals of 5G mobile networks, 1st edn. Wiley, Chichester/West Sussex

    Book  Google Scholar 

  2. Al-Dulaimi A, Chih-Lin I, Wang X (2018) 5G networks: fundamental requirements, enabling technologies, and operations management. 1st edn. New Jersey: Wiley

    Google Scholar 

  3. Edfors O, Larsson E-G, Marzetta T-L, Tufvesson F (2014) Massive MIMO for next generation wireless systems. IEEE Commun Mag, pp 186–195

    Google Scholar 

  4. Ge X, Mao G, Han T, Tu S, Wang C-X (2016) 5G ultra-dense cellular networks. In: IEEE wireless communications. 23(1):72–79

    Google Scholar 

  5. Ylianttila M et al 6g white paper: research challenges for trust, security and privacy. arXiv:2004.11665

  6. Shlezinger N et al (2021) Dynamic metasurface antennas for 6G extreme massive MIMO communications. IEEE Wirel Commun 28(2):106–113

    Google Scholar 

  7. Rajatheva et al (2020) White paper on broadband connectivity in 6G. arXiv:2004.14247v1[eess.SP]. https://arxiv.org/abs/2004.14247

  8. Chen M et al (2019) Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE Commun Surv Tutorials 21(4):3039–3071

    Google Scholar 

  9. Khan LU et al (2020) Network slicing: recent advances, taxonomy, requirements, and open research challenges. IEEE Access 8:36009–36028. https://doi.org/10.1109/ACCESS.2020.2975072

  10. Giordani M et al (2020) Toward 6G networks: use cases and technologies. In: IEEE communications magazine 58(3):55–61. https://doi.org/10.1109/MCOM.001.1900411

  11. Nayak S, Patgiri R (2020) 6G communication: envisioning the key issues and challenges. arXiv:2004.04024

  12. Jagannath A, Jagannath J, Melodia T (2021) Redefining wireless communication for 6G: signal processing meets deep learning with deep unfolding. IEEE Trans Artif Intell 2(6):528–536. https://doi.org/10.1109/TAI.2021.3108129

  13. Yue C et al (2022) Efficient decoders for short block length codes in 6G URLLC. arXiv:2206.09572

  14. European Commission (2021) Shaping Europe’s digital future: 5G. https://digital-strategy.ec.europa.eu/en/policies/5g. Accessed 19 Jan 2023

  15. IEEE (2018) IEEE standards association: IEEE standards activities in 5G”. Available at https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/5G.pdf. Accessed 18 Aug 2019

  16. GSMA (2019) Intelligent connectivity: how the combination of 5G, AI, big data and IoT is set to change everything. Available at https://www.gsma.com/IC/wp-content/uploads/2019/02/22209-Intelligent-connectivity-report.pdf. Accessed 19 Jan 2023

  17. Seeburn K (2019) 5G and AI: a potentially potent combination. Available at http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=1146#Comments. Accessed 20 Jan 2023

  18. Drechsler et al (2020) At the crossroads between digital innovation and digital transformation. https://www.researchgate.net/publication/341412594_At_the_Crossroads_between_Digital_Innovation_and_Digital_Transformation. Accessed 20 Jan 2023

  19. Kokolek et al (2019) Data protection in the EU. https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en

  20. Forradellas R, Gallastegui L (2021) Digital transformation and artificial intelligence applied to business: legal regulations, economic impact and perspective. https://www.mdpi.com/2075-471X/10/3/70. Accessed 19 Jan 2023

  21. Fedrecheski G et al (2020) Self-sovereign identity for IoT environments: a perspective. In: 2020 global internet of things summit (GIoTS). IEEE

    Google Scholar 

  22. Harper KE, Ganz C, Malakuti S (2019) Digital twin architecture and standards. IIC J Innov 12(2019):72–83

    Google Scholar 

  23. Bhowmik D, Feng T (2017) The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: 2017 22nd international conference on digital signal processing (DSP). IEEE

    Google Scholar 

  24. Bakre A, Patil N, Gupta S (2017) Implementing decentralized digital identity using blockchain. Int J Eng Technol Sci Res 4(10):379–385

    Google Scholar 

  25. Yaqoob I et al (2020) Blockchain for digital twins: recent advances and future research challenges. IEEE Netw 34(5):290–298

    Google Scholar 

  26. Vast R et al (2021) Artificial intelligence based security orchestration, automation and response system. In: 2021 6th international conference for convergence in technology (I2CT). IEEE

    Google Scholar 

  27. Ahmad I, Gurtov A, Kumar T, Liyanage M, Okwuibe J, Ylianttila M (2017) [online] Available at http://jultika.oulu.fi/files/nbnfi-fe201902124647.pdf. Accessed 23 Jan 2023

  28. Yesuf AS (2017) A review of risk identification approaches in the telecommunication domain. https://www.researchgate.net/publication/314392917_A_Review_of_Risk_Identification_Approaches_in_the_Telecommunication_Domain [PDF] In: Conference paper. Conference: the 3rd international conference on information systems security and privacy—ICISSP. Accessed 20 Jan 2023

  29. Reuters (2017) Cyberattack hits 200,000 in at least 150 countries: Europol https://www.reuters.com/article/us-cyber-attack-europol-idUSKCN18A0FX. Accessed 20 Jan 2023

  30. Brewster T (2017) How hackers broke equifax: exploiting a patchable vulnerability. forbes. https://www.forbes.com/sites/thomasbrewster/2017/09/14/equifax-hack-the-result-of-patched-vulnerability/?sh=ce0ddce5cda4. Accessed 20 Jan 2023

  31. Wang A (2018) ‘I’m in your baby’s room’: a hacker took over a baby monitor and broadcast threats, parents say. Washington Post. https://www.washingtonpost.com/technology/2018/12/20/nest-cam-baby-monitor-hacked-kidnap-threat-came-device-parents-say/

  32. Shu X et al (2017) Breaking the target: an analysis of target data breach and lessons learned. arXiv preprint. https://arxiv.org/pdf/1701.04940.pdf. Accessed 20 Jan 2023

  33. Gara T, Warzel C (2014) A look through the sony pictures data hack: this is as bad as it gets. BuzzfeedNews. https://www.docketalarm.com/cases/PTAB/CBM2015-00030/Covered_Business_Method_Patent_Review_of_U.S._Pat._6321201/03-10-2015-Patent_Owner/Exhibit-2002-Exhibit_2002___A_Look_Through_The_Sony_Pictures_Data_Hack___BuzzFeed_News/

  34. SDxCentral (2019) What are the top 5G security. Challenges”. Available at https://www.sdxcentral.com/5g/definitions/top-5g-security-challenges/. Accessed 17 Aug 2019

  35. Zhang Y (2018) Network function virtualization concepts and applicability in 5G networks, 1st edn. Wiley, New Jersey

    Book  Google Scholar 

  36. Condoluci M, Mahmoodi T (2018) Softwarization and virtualization in 5G mobile networks: benefits, trends and challenges. Comput Netw 146(1):65–84

    Article  Google Scholar 

  37. Huawei (2018) 5G security: forward thinking Huawei white paper. Available at https://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf. Accessed 19 Jan 2023

  38. Calder A, Watkins S (2015) IT governance: an international guide to data security and ISO27001/ISO27002, 6th edn. Kogan Page, London

    Google Scholar 

  39. Miller L (2016) IoT security for dummies, inside secure edition, 1st edn. John Wiley & Sons, Chichester/West Sussex

    Google Scholar 

  40. Blum JJ, Lawson-Jenkins K, Hoffman L-J (2006) Trust beyond security: An expanded trust model. Commun ACM 49(7):95–101

    Google Scholar 

  41. Fogg BJ, Tseng S (1999) Credibility and computing technology. Commun ACM 42(5):39–44

    Article  Google Scholar 

  42. GOV.UK (2022) Cyber Security Breaches Survey 2022. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022/cyber-security-breaches-survey-2022#chapter-5-incidence-and-impact-of-breaches-or-attacks https://www.ncsc.gov.uk/news/data-breach-500m-yahoo-accounts https://hoteltechreport.com/news/marriott-data-breach. Accessed 19 Jan 2023

  43. Confessore N (2018) Cambridge analytica and facebook: the scandal and the fallout so far https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html. Accessed 19 Jan 2023

  44. Aïmeur E, Schőnfeld D (2011) The ultimate invasion of privacy: identity theft. In: 2011 ninth annual international conference on privacy, security and trust. IEEE. https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html Accessed 23 Jan 2023

  45. Privacy International (2017) 101: data protection. https://privacyinternational.org/explainer/41/101-data-protection. Accessed 23 Jan 2023

  46. Masombuka M, Grobler M, Watson B (2018) Towards an artificial intelligence framework to actively defend cyberspace. In: European conference on cyber warfare and security. Academic conferences international limited. https://search.proquest.com/openview/f6ccddd62973bd89da756a6c4f7272f0/1?pq-origsite=gscholar&cbl=396497&casa_token=fefF24OzjlcAAAAA:lW8TZptX9KGeshqbVXXBk1MBmrm0zyKHj5mmY62oPWdizJiYTe0WcDk4RMFtG2P0ZsuzdvAtZBo

  47. Babiceanu RF, Seker R (2023) Big data and virtualization for manufacturing cyber-physical systems: a survey of the current status and future outlook. Computers in industry 81:128–137. https://www.sciencedirect.com/science/article/pii/S0166361516300471?casa_token=S59wxZXqps8AAAAA:SudkZGNExVlneS0cwzOiJPq3T6peQI63_K3I1fFNKuIkNz4hhlaAt4IKbxWnjFT9WBwX37vxlII. Accessed 22 Jan 2023

  48. Hicks A et al (2019) Global mapping of citizen science projects for disaster risk reduction. Frontiers Earth Sci 7:226. https://doi.org/10.3389/feart.2019.00226/full. Accessed 19 Jan 2023

  49. ISO/IEC (2022) https://www.iso.org/standard/82875.html

  50. NIST (2018) https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf

  51. ISO (2019) https://www.iso.org/standard/75106.html

  52. BS (2007) https://knowledge.bsigroup.com/products/business-continuity-management-specification-1/standard

  53. Schlehahn E (2020) Cybersecurity and the state. The ethics of cybersecurity. Springer, Cham, 205–225

    Google Scholar 

  54. Eltringham M (2017) UK organisations remain unprepared to deal with effects of cyber attack. UK organisations remain unprepared to deal with effects of cyber attack—Workplace Insight. Accessed 19 Jan 2023

    Google Scholar 

  55. Caulkins B, Marlowe T, Reardon A (2018) Cybersecurity skills to address today’s threats. In: Ahram T, Nicholson D (eds) Advances in human factors in cybersecurity, AHFE 2018. Advances in intelligent systems and computing, pp 782–788. https://doi.org/10.1007/978-3-319-94782-2_18

  56. Panda A, Bower A (2020) Cyber security and the disaster resilience framework. Int J Disaster Resilience Built Environ 11(4):507–518

    Article  Google Scholar 

  57. Goodwin C et al (2015) A framework for cybersecurity information sharing and risk reduction. Microsoft

    Google Scholar 

  58. Landry BJL, Koger MS (2006) Dispelling 10 common disaster recovery myths: Lessons learned from hurricane katrina and other disasters. J Educ Resour Comput (JERIC) 6(4):6-es

    Google Scholar 

  59. Hyslop M (2007) Comments on standards in information security, disaster recovery, business continuity and business resilience. Crit Inf Infrastruct Resilience Prot (2007):94–144

    Google Scholar 

  60. Schmidt CG, Wagner SM (2019) Blockchain and supply chain relations: a transaction cost theory perspective. J Purch Supply Manag 25(4):100552

    Article  Google Scholar 

  61. Pickles J, Zhu S (2013) The California transparency in supply chains act. SSRN Electron J. https://doi.org/10.2139/ssrn.2237437

    Article  Google Scholar 

  62. Cheung K-F, Bell MGH, Bhattacharjya J (2021) Cybersecurity in logistics and supply chain management: an overview and future research directions. Transp Res Part E Logistics Transp Rev 146:102217. https://doi.org/10.1016/j.tre.2020.102217

    Article  Google Scholar 

  63. Kendzierskyj et al (2021) Cyber security and supply chain management, pp 147–174. https://doi.org/10.1142/9789811233128_0007. Accessed 22 Jan 2023

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Jahankhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jahankhani, H., Kendzierskyj, S., Hussien, O. (2023). Approaches and Methods for Regulation of Security Risks in 5G and 6G. In: Jahankhani, H., El Hajjar, A. (eds) Wireless Networks . Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33631-7_2

Download citation

Publish with us

Policies and ethics