General Aspects of Information Security in 5G Networks: Survey

Main Article Content

Vitor Oriel de Castro Nunes Borges
Renata Lopes Rosa

Abstract

As the deployment of 5G networks accelerates, ensuring robust security becomes paramount. This article presents a comprehensive review of security in 5G networks, aiming to analyze security applications and strategies for mitigating vulnerabilities. Through an extensive literature review, several threats and specific security vulnerabilities of 5G networks are identified as issues in corporate networks, user equipment, and applications. Furthermore, possible future security trends, vulnerability mitigations, and emerging technologies in 5G networks are explored. The article concludes by highlighting the importance of addressing security concerns in 5G networks and provides recommendations for future research in this field. Understanding the security landscape of 5G networks is crucial to ensuring the safe and reliable operation of next-generation communication infrastructure.

Article Details

How to Cite
de Castro Nunes Borges, V. O., & Lopes Rosa, R. (2023). General Aspects of Information Security in 5G Networks: Survey. INFOCOMP Journal of Computer Science, 22(1). Retrieved from https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/3072
Section
Network, Communication, Operating Systems, Parallel and Distributed Computing

References

Adam, I. and Ping, J. Framework for security event management in 5g. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, New York, NY, USA, 2018. Association for Computing Machinery.

Al-Falahy, N. and Alani, O. Y. Technologies for 5g networks: Challenges and opportunities. It Professional, 19(1):12–20, 2017.

Alain Sultan, M. 5g system overview, 2023.

Amgoune, H. and Mazri, T. 5g: Interconnection of services and security approaches. In Proceedings of the 3rd International Conference on Smart City Applications, SCA ’18, New York, NY, USA, 2018. Association for Computing Machinery.

Borges, V. and Uchoa, J. Fuzzingtool: Ferramenta para testes de intrusao em aplicacoes web. In Anais do XXI Simposio Brasileiro em Seguranca da Informacao e de Sistemas Computacionais, pages 391–396, Porto Alegre, RS, Brasil, 2021. SBC.

Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., and Xiong, L. A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys Tutorials, 22(1):170–195, 2020.

Carrillo, D., Kalalas, C., Raussi, P., Michalopoulos, D. S., Rodríguez, D. Z., Kokkoniemi- Tarkkanen, H., Ahola, K., Nardelli, P. H., Fraidenraich, G., and Popovski, P. Boosting 5g on smart grid communication: A smart ran slicing approach. IEEE Wireless Communications, 2022.

Cook, J., Rehman, S. U., and Khan, M. A. Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions. IEEE Access, 2023.

Cui, Z., Cui, B., Su, L., Du, H., Wang, H., and Fu, J. Attacks against security context in 5g network. arXiv preprint arXiv:2303.10955, 2023.

Damir, M. T., Meskanen, T., Ramezanian, S., and Niemi, V. A beyond-5g authentication and key agreement protocol, 2022.

dos Santos, M. R., Batista, A. P., Rosa, R. L., Saadi, M., Melgarejo, D. C., and Rodríguez, D. Z. Asqm: Audio streaming quality metric based on network impairments and user preferences. IEEE Transactions on Consumer Electronics, 2023.

Fang, D., Qian, Y., and Hu, R. Q. Security for 5g mobile wireless networks. IEEE access, 6:4850– 4874, 2017.

Fang, D., Qian, Y., and Hu, R. Q. Security requirement and standards for 4g and 5g wireless

systems. GetMobile: Mobile Comp. and Comm., 22(1):15â20, may 2018.

Hanane, O. and Tomader, M. 4g and 5g: Security and privacy analysis. In Proceedings of the 4th International

Conference on Big Data and Internet of Things, BDIoT’19, New York, NY, USA, 2020. Association for Computing Machinery.

Imbruglia, A., Cancila, D., and Settembre, M. 5g communication and security in connected vehicles. Ada Lett., 42(2):109â113, apr 2023.

Lasierra, O., Garcia-Aviles, G., Municio, E., Skarmeta, A., and Costa-Pérez, X. European 5g

security in the wild: Reality versus expectations. arXiv preprint arXiv:2305.08635, 2023.

Li, X., He, M., and Ni, J. Secure and privacypreserving network slicing in 3gpp 5g system architecture. arXiv preprint arXiv:2305.17524, 2023.

Melgarejo, D. C., Da Costa Filho, L. Q. R., De Medeiros, Á. A. M., Neto, C. L., Figueiredo, F. L., and Rodríguez, D. Z. Dynamic algorithm

for interference mitigation between cells in networks operating in the 250 mhz band. IEEE Access, 10:33803–33815, 2022.

Nie, S., Zhang, Y., Wan, T., Duan, H., and Li, S. Measuring the deployment of 5g security enhancement.

In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and

Mobile Networks, WiSec ’22, page 169â174, New York, NY, USA, 2022. Association for Computing Machinery.

Ogobuchi, O. D., Vieira, S. T., Saadi, M., Rosa, R. L., and Rodríguez, D. Z. Intelligent network

planning tool for location optimization of unmanned aerial vehicle base stations using geographical

images. Journal of Electronic Imaging, 31(6):061822–061822, 2022.

Okey, O. D., Maidin, S. S., Adasme, P., Lopes Rosa, R., Saadi, M., Carrillo Melgarejo,

D., and Zegarra Rodríguez, D. Boostedenml: Efficient technique for detecting cyberattacks in iot

systems using boosted ensemble machine learning. Sensors, 22(19):7409, 2022.

Parnianifard, A., Rodriguez, D. Z., Mumtaz, S., Wuttisittikulkij, L., et al. Speech emotion

recognition using anfis and pso-optimization with word2vec. 2022.

PINTO, G. E., Rosa, R. L., and Rodriguez, D. Z. Applications for 5g networks. INFOCOMP Journal of Computer Science, 20(1), 2021.

Rahimi, H., Zibaeenejad, A., Rajabzadeh, P., and Safavi, A. A. On the security of the 5g-iot architecture.

In Proceedings of the International Conference on Smart Cities and Internet of Things,

SCIOT ’18, New York, NY, USA, 2018. Association for Computing Machinery.

Ramezanpour, K., Jagannath, J., and Jagannath, A. Security and privacy vulnerabilities of 5g/6g

and wifi 6: Survey and research directions from a coexistence perspective. Computer Networks, 221:109515, 2023.

Ranaweera, P., Jurcut, A., and Liyanage, M. Mecenabled 5g use cases: A survey on security vulnerabilities

and countermeasures. ACM Comput. Surv., 54(9), oct 2021.

Ravishankar, V. and Marshall, A. M. Teaching an undergraduate 5g technology and security course,

and its outcomes. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2, SIGCSE 2023, page 1405, New York, NY, USA, 2023. Association for Computing Machinery.

Ribeiro, D. A., Melgarejo, D. C., Saadi, M., Rosa, R. L., and Rodríguez, D. Z. A novel deep deterministic

policy gradient model applied to intelligent transportation system security problems in 5g

and 6g network scenarios. Physical Communication, 56:101938, 2023.

Saadi, M., Bajpai, A., Rodriguez, D. Z., and Wuttisittikulkij, L. Investigating the role of channel

state information for mimo based visible light communication system. In 2022 37th International

Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC),

pages 1–4. IEEE, 2022.

Salazar, Z., Nguyen, H. N., Mallouli, W., Cavalli, A. R., and Montes de Oca, E. 5greplay: A 5g

network traffic fuzzer - application to attack injection. In Proceedings of the 16th International

Conference on Availability, Reliability and Security, ARES 21, New York, NY, USA, 2021. Association

for Computing Machinery.

Sharma, V., You, I., and Guizani, N. Security of 5g-v2x: Technologies, standardization, and research

directions. IEEE Network, 34(5):306–314, 2020.

Surridge, M., Correndo, G., Meacham, K., Papay, J., Phillips, S. C., Wiegand, S., and Wilkinson,

T. Trust modelling in 5g mobile networks. In Proceedings of the 2018 Workshop on Security in

Softwarized Networks: Prospects and Challenges, SecSoN ’18, page 14â19, New York, NY, USA,

Association for Computing Machinery.

Teodoro, A. A., Gomes, O. S., Saadi, M., Silva, B. A., Rosa, R. L., and Rodríguez, D. Z. An fpgabased

performance evaluation of artificial neural network architecture algorithm for iot. Wireless

Personal Communications, pages 1–32, 2021.

Wazid, M., Das, A. K., Shetty, S., Gope, P., and Rodrigues, J. J. Security in 5g-enabled internet

of things communication: issues, challenges, and future research roadmap. IEEE Access, 9:4466– 4489, 2020.

Ziegler, V., Wild, T., Uusitalo, M., Flinck, H., Räisänen, V., and Hätönen, K. Stratification of

g evolution and beyond 5g. In 2019 IEEE 2nd 5G World Forum (5GWF), pages 329–334. IEEE,