University of Oulu

I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "5G security: Analysis of threats and solutions," 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, 2017, pp. 193-199

5G security : analysis of threats and solutions

Saved in:
Author: Ahmad, Ijaz1; Kumar, Tanesh1; Liyanage, Madhusanka1;
Organizations: 1Centre for Wireless Communications, University of Oulu, Finland
2Department of Computer and Information Science, Linköping University, SE-581 83 Linköping, Sweden
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 5.8 MB)
Persistent link:
Language: English
Published: Institute of Electrical and Electronics Engineers, 2017
Publish Date: 2018-07-30


5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.

see all

ISBN: 978-1-5386-3070-9
ISBN Print: 978-1-5386-3071-6
Pages: 193 - 199
DOI: 10.1109/CSCN.2017.8088621
Host publication: 2017 IEEE conference on standards for communications and networking (CSCN)
Conference: IEEE conference on standards for communications and networking
Type of Publication: A4 Article in conference proceedings
Field of Science: 213 Electronic, automation and communications engineering, electronics
Funding: This work was supported by TEKES Finland and Academy of Finland under projects: The Naked Approach, Towards Digital Paradise and SecureConnect. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
Copyright information: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.