General Aspects of Information Security in 5G Networks: Survey
Main Article Content
Abstract
As the deployment of 5G networks accelerates, ensuring robust security becomes paramount. This article presents a comprehensive review of security in 5G networks, aiming to analyze security applications and strategies for mitigating vulnerabilities. Through an extensive literature review, several threats and specific security vulnerabilities of 5G networks are identified as issues in corporate networks, user equipment, and applications. Furthermore, possible future security trends, vulnerability mitigations, and emerging technologies in 5G networks are explored. The article concludes by highlighting the importance of addressing security concerns in 5G networks and provides recommendations for future research in this field. Understanding the security landscape of 5G networks is crucial to ensuring the safe and reliable operation of next-generation communication infrastructure.
Article Details
Upon receipt of accepted manuscripts, authors will be invited to complete a copyright license to publish the paper. At least the corresponding author must send the copyright form signed for publication. It is a condition of publication that authors grant an exclusive licence to the the INFOCOMP Journal of Computer Science. This ensures that requests from third parties to reproduce articles are handled efficiently and consistently and will also allow the article to be as widely disseminated as possible. In assigning the copyright license, authors may use their own material in other publications and ensure that the INFOCOMP Journal of Computer Science is acknowledged as the original publication place.
References
Adam, I. and Ping, J. Framework for security event management in 5g. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, New York, NY, USA, 2018. Association for Computing Machinery.
Al-Falahy, N. and Alani, O. Y. Technologies for 5g networks: Challenges and opportunities. It Professional, 19(1):12–20, 2017.
Alain Sultan, M. 5g system overview, 2023.
Amgoune, H. and Mazri, T. 5g: Interconnection of services and security approaches. In Proceedings of the 3rd International Conference on Smart City Applications, SCA ’18, New York, NY, USA, 2018. Association for Computing Machinery.
Borges, V. and Uchoa, J. Fuzzingtool: Ferramenta para testes de intrusao em aplicacoes web. In Anais do XXI Simposio Brasileiro em Seguranca da Informacao e de Sistemas Computacionais, pages 391–396, Porto Alegre, RS, Brasil, 2021. SBC.
Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., and Xiong, L. A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys Tutorials, 22(1):170–195, 2020.
Carrillo, D., Kalalas, C., Raussi, P., Michalopoulos, D. S., Rodríguez, D. Z., Kokkoniemi- Tarkkanen, H., Ahola, K., Nardelli, P. H., Fraidenraich, G., and Popovski, P. Boosting 5g on smart grid communication: A smart ran slicing approach. IEEE Wireless Communications, 2022.
Cook, J., Rehman, S. U., and Khan, M. A. Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions. IEEE Access, 2023.
Cui, Z., Cui, B., Su, L., Du, H., Wang, H., and Fu, J. Attacks against security context in 5g network. arXiv preprint arXiv:2303.10955, 2023.
Damir, M. T., Meskanen, T., Ramezanian, S., and Niemi, V. A beyond-5g authentication and key agreement protocol, 2022.
dos Santos, M. R., Batista, A. P., Rosa, R. L., Saadi, M., Melgarejo, D. C., and Rodríguez, D. Z. Asqm: Audio streaming quality metric based on network impairments and user preferences. IEEE Transactions on Consumer Electronics, 2023.
Fang, D., Qian, Y., and Hu, R. Q. Security for 5g mobile wireless networks. IEEE access, 6:4850– 4874, 2017.
Fang, D., Qian, Y., and Hu, R. Q. Security requirement and standards for 4g and 5g wireless
systems. GetMobile: Mobile Comp. and Comm., 22(1):15â20, may 2018.
Hanane, O. and Tomader, M. 4g and 5g: Security and privacy analysis. In Proceedings of the 4th International
Conference on Big Data and Internet of Things, BDIoT’19, New York, NY, USA, 2020. Association for Computing Machinery.
Imbruglia, A., Cancila, D., and Settembre, M. 5g communication and security in connected vehicles. Ada Lett., 42(2):109â113, apr 2023.
Lasierra, O., Garcia-Aviles, G., Municio, E., Skarmeta, A., and Costa-Pérez, X. European 5g
security in the wild: Reality versus expectations. arXiv preprint arXiv:2305.08635, 2023.
Li, X., He, M., and Ni, J. Secure and privacypreserving network slicing in 3gpp 5g system architecture. arXiv preprint arXiv:2305.17524, 2023.
Melgarejo, D. C., Da Costa Filho, L. Q. R., De Medeiros, Á. A. M., Neto, C. L., Figueiredo, F. L., and Rodríguez, D. Z. Dynamic algorithm
for interference mitigation between cells in networks operating in the 250 mhz band. IEEE Access, 10:33803–33815, 2022.
Nie, S., Zhang, Y., Wan, T., Duan, H., and Li, S. Measuring the deployment of 5g security enhancement.
In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and
Mobile Networks, WiSec ’22, page 169â174, New York, NY, USA, 2022. Association for Computing Machinery.
Ogobuchi, O. D., Vieira, S. T., Saadi, M., Rosa, R. L., and Rodríguez, D. Z. Intelligent network
planning tool for location optimization of unmanned aerial vehicle base stations using geographical
images. Journal of Electronic Imaging, 31(6):061822–061822, 2022.
Okey, O. D., Maidin, S. S., Adasme, P., Lopes Rosa, R., Saadi, M., Carrillo Melgarejo,
D., and Zegarra Rodríguez, D. Boostedenml: Efficient technique for detecting cyberattacks in iot
systems using boosted ensemble machine learning. Sensors, 22(19):7409, 2022.
Parnianifard, A., Rodriguez, D. Z., Mumtaz, S., Wuttisittikulkij, L., et al. Speech emotion
recognition using anfis and pso-optimization with word2vec. 2022.
PINTO, G. E., Rosa, R. L., and Rodriguez, D. Z. Applications for 5g networks. INFOCOMP Journal of Computer Science, 20(1), 2021.
Rahimi, H., Zibaeenejad, A., Rajabzadeh, P., and Safavi, A. A. On the security of the 5g-iot architecture.
In Proceedings of the International Conference on Smart Cities and Internet of Things,
SCIOT ’18, New York, NY, USA, 2018. Association for Computing Machinery.
Ramezanpour, K., Jagannath, J., and Jagannath, A. Security and privacy vulnerabilities of 5g/6g
and wifi 6: Survey and research directions from a coexistence perspective. Computer Networks, 221:109515, 2023.
Ranaweera, P., Jurcut, A., and Liyanage, M. Mecenabled 5g use cases: A survey on security vulnerabilities
and countermeasures. ACM Comput. Surv., 54(9), oct 2021.
Ravishankar, V. and Marshall, A. M. Teaching an undergraduate 5g technology and security course,
and its outcomes. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2, SIGCSE 2023, page 1405, New York, NY, USA, 2023. Association for Computing Machinery.
Ribeiro, D. A., Melgarejo, D. C., Saadi, M., Rosa, R. L., and Rodríguez, D. Z. A novel deep deterministic
policy gradient model applied to intelligent transportation system security problems in 5g
and 6g network scenarios. Physical Communication, 56:101938, 2023.
Saadi, M., Bajpai, A., Rodriguez, D. Z., and Wuttisittikulkij, L. Investigating the role of channel
state information for mimo based visible light communication system. In 2022 37th International
Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC),
pages 1–4. IEEE, 2022.
Salazar, Z., Nguyen, H. N., Mallouli, W., Cavalli, A. R., and Montes de Oca, E. 5greplay: A 5g
network traffic fuzzer - application to attack injection. In Proceedings of the 16th International
Conference on Availability, Reliability and Security, ARES 21, New York, NY, USA, 2021. Association
for Computing Machinery.
Sharma, V., You, I., and Guizani, N. Security of 5g-v2x: Technologies, standardization, and research
directions. IEEE Network, 34(5):306–314, 2020.
Surridge, M., Correndo, G., Meacham, K., Papay, J., Phillips, S. C., Wiegand, S., and Wilkinson,
T. Trust modelling in 5g mobile networks. In Proceedings of the 2018 Workshop on Security in
Softwarized Networks: Prospects and Challenges, SecSoN ’18, page 14â19, New York, NY, USA,
Association for Computing Machinery.
Teodoro, A. A., Gomes, O. S., Saadi, M., Silva, B. A., Rosa, R. L., and Rodríguez, D. Z. An fpgabased
performance evaluation of artificial neural network architecture algorithm for iot. Wireless
Personal Communications, pages 1–32, 2021.
Wazid, M., Das, A. K., Shetty, S., Gope, P., and Rodrigues, J. J. Security in 5g-enabled internet
of things communication: issues, challenges, and future research roadmap. IEEE Access, 9:4466– 4489, 2020.
Ziegler, V., Wild, T., Uusitalo, M., Flinck, H., Räisänen, V., and Hätönen, K. Stratification of
g evolution and beyond 5g. In 2019 IEEE 2nd 5G World Forum (5GWF), pages 329–334. IEEE,