Security for 5G and beyond |
|
Author: | Ahmad, Ijaz1,2; Shahabuddin, Shahriar1,3; Kumar, Tanesh1; |
Organizations: |
1Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland 2VTT Technical Research Centre of Finland, 02150 Espoo, Finland 3Nokia, 90620 Oulu, Finland
4Department of Computer and Information Science, Linköping University, SE-581 83 Linköping, Sweden
|
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 5.8 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2020040210120 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2019
|
Publish Date: | 2020-04-02 |
Description: |
AbstractThe development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as future generations (XG) in this paper. In brief, this paper highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G. see all
|
Series: |
IEEE communications surveys and tutorials |
ISSN: | 1553-877X |
ISSN-E: | 2373-745X |
ISSN-L: | 1553-877X |
Volume: | 21 |
Issue: | 4 |
Pages: | 3682 - 3722 |
DOI: | 10.1109/COMST.2019.2916180 |
OADOI: | https://oadoi.org/10.1109/COMST.2019.2916180 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This work was supported by the Academy of Finland through Project 6Genesis Flagship under Grant 318927, through Project MEC-AI, through Project Industrial Edge, and through Project SecureConnect. The work of I. Ahmad was supported by the Jorma Ollila Grant. The work of A. Gurtov was supported by the Center for Industrial Information Technology. |
Academy of Finland Grant Number: |
318927 |
Detailed Information: |
318927 (Academy of Finland Funding decision) |
Copyright information: |
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |