EAI Endorsed Transactions
on Internet of Things
Research Article
Overview of 5G & Beyond Security
Fawad Shokoor1, Wasswa Shafik2 and S. Mojtaba Matinkhah2,*
1
Computer Engineering Department, Yazd University, P.O. Box 89175-741, Yazd, Iran
Computer Engineering Department, Intelligent Connectivity Research Lab, P.O. Box 89175-741, Yazd University, Yazd,
Iran
2
Abstract
Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences,
and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth
Generation (5G) and security aspect. This is more predictable since the core technology; the synonymous approach is
possible with Fifth Generation (5G) and Beyond Technologies though with limited access. Many incidents have shown
that the possibility of a hacked wireless network, not just impacts privacy and security worries, but also hinders the diverse
dynamics of the ecosystem. Security attacks have grown in frequency and severity throughout the near past, making
detection mechanisms harder.
Keywords: 5G & Beyond, Network Security, Internet of Things, Software-Defined Networking, Network Function Virtualization
Received on 23 May 2022, accepted on 23 June 2022, published on 27 June 2022
Copyright © 2022 Fawad Shokoor et al., licensed to EAI. This is an open access article distributed under the terms of the Creative
Commons Attribution license, which permits unlimited use, distribution, and reproduction in any medium so long as the original
work is properly cited.
doi: 10.4108/eetiot.v8i30.1624
_______________________________________________
*Corresponding author. Email:
[email protected]
network operations from branded hardware to be run as
examples of software [6]. MEC and Cloud Computing can
offer network scalability on-demand; see [7] and [8].
Network slicing increases support for various types of
traffic
in
5G
networks.
In
this
modern
telecommunications network, privacy and security
protection are now the key concerns, as threats can have
high implications [9-12].
The network's software allows the 5G network to be
perceived as a set of layers comparable to the SDN
(software-defined network) networks. Where, 5G can
accommodate a wide variety of items, from smartphones
to different IoT devices [13] and [14]. IoT devices extend
from basic kitchen appliances to sensors and other
technologically sophisticated technology. Various RAT
(Radio Access Technologies) for linking those computers
would also be enabled by 5G [15].
In comparison to pre-4G technology, 5G will
incorporate a variety of emerging wireless technologies,
for example, Non-Orthogonal Multiple Access (NOMA),
broad Multiple Input Multiple Output (MIMO),
millimeter-wave (mm-Wave), and many more
technologies for IoT networking [16-21]. Within Figure 1,
an illustration of the high-level 5G system architecture is
demonstrated.
O
1. Introduction
Mobile network architecture has been offered to satisfy
the changing needs of new network technology for
increased capacity, accessibility, flexibility, and energy
consumption [1]. Innovative networking technologies for
instance Cloud Computing (CC), Software Defined
Networking (SDN), Network Function Virtualization
(NFV), Multi-Access Edge Computing (MEC), and
Network Slicing (NS) technologies are being
implemented into telecommunications networks by
telecommunications standardization bodies [2] and [3].
These initiatives are aimed at developing a modern
mobile software system. To satisfy the needs for the
future evolution of mobile networks, this would help
develop new and innovative network services. The
concept of SDN offers decoupling of networking device
regulation and user planes SDN based network-control
and information are put in a controller logically
centralized [4].
This could also give the control functions and the
application layer for the company an overview of the
underpinning system architecture. NFV provides a fresh
method for the development, delivery, and management
of networking services [5]. This idea is meant to separate
1
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
P
Figure 1. A 5g network and (8) eight
security landscape threats.
practically most of the above vulnerabilities and pre-5G
smartphone technology requirements are still applicable.
Second, due to increasing customer numbers, a new set of
security problems will be faced by 5G, connected device
complexity, emerging network capabilities, elevated
consumer privacy issues, emerging stakeholders, and IoT
support requirements and mission-critical applications.
Third, the softwarization of the network and use of
emerging technology like MEC, NS, SDN, and NFV will
bring a whole new range of privacy and security issues.
Fig. 3 describes the general perspective of the conditions
for 5G Security that were developed based on these three
elements. We intend to include a review of the cuttingedge technology (for example, NFV, MEC, SDN, etc.)
that have been the key basic components of the 5G
cellular network in this report. Another target is to
consider the developments from MEC, NFV, SDN, and so
on in security and privacy.
To this end, we concentrate mainly on the
contributions that discuss the protection and privacy of
5G networks from both academia and industry.
As defined in Figure 4, also based on security risks and
concerns relating to key 5G technology in this article. 5G
is one of the widely popular areas of research for
telecommunications professionals as the next wave of
broadband networks. As a result, several reports on 5G
networks have already been completed, [14-18]. O
In addition, most security architectures in pre-5G (that's to
say, second-generation (2G), third generation (3G), and
Fourth Generation (4G) networks will not be specifically
used in 5G because of the current infrastructure and new
technology [21] and [22]. But with some modification,
some of the protection mechanisms can be used. The
platform of Open-Air Interface (OAI) discussed
compatibility backward in the large 5G sense with the
prior generation and summary of the 5G Encryption
Protocol enhancement [23, 24].
The main security goal of the telecommunications
network ensuring the accurate operation of the payment
system and the protection of the wireless medium by
encrypting transmitting data. For 3G, double-way
authentication is used to prevent links with fabricated BS
from being established as illustrated in Figure 2. To
authenticate users, modern cryptographic protocols are
used by 4G. Also, it defends physical threats, like the
actual destruction of base stations that can be installed in
public and consumer properties.
Besides, any of the issues with privacy in the pre-5G
network were addressed to some extent because consumer
data was kept in mobile operators' records. 5G privacy
and protection problems however overshadow these
processes due to technological improvements and novel
services. Three key components of 5G security and
beyond 5G networks are made of, first, in 5G and beyond,
2
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
Figure 2. A 5g network top-level architecture with a different operating layer
protection of highlight 5G technology with security
analysis in 5G networks is essential [30].
Many of these papers rely on certain technologies like
protection NS, MEC, NFV, and SDN. Such reports are,
however, very weak in resolving security concerns as they
are incorporated into 5G networks. Such papers do not
provide a thorough review of all the safety issues like
hazard vectors, IoT protection, and network slicing, along
with associated initiatives [31] and [32].
Therefore, this study includes a broad review of the
cutting-edge security technologies and processes expected
by the extension of previous 5G complementary security
infrastructure works.
O
These articles discussed many potential research
opportunities, like infrastructure, flexibility organization,
traffic organization, privacy, security, and technological
economic features, which are extremely important to
consider during the 5G implementation. The reliability of
the 5G core network technologies is indefeasible
consideration between these requirements. As one of the
most critical criteria of the 5G testing area, therefore
making security on spot.
A relatively small number of study articles have been
released in the 5G security area [25-29]. Both facets of 5G
technology have been considered in none of the above
reports. But in the other hand, in various novel networks
like MEC, NFV, SDN, NS, and cloud storage, 5G has
produced software developments. Consideration of the
3
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
Figure 3. Eight specification requirements of 5G & beyond Technology.
Figure 3. Mobile network security growth and threat environment
4
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
There is not a single report to the extent of our
understanding that covers a wider spectrum of 5G security
when including the whole of the main 5G innovations.
Therefore, this is the first research on the main network
softwarization techniques employed in 5G networks to
address protection and privacy concerns. Because both
network softwarization technologies are so important to
5G understanding, it is important to illustrate their
protection and privacy interconnections, and securityassociated interdependencies in future 5G networks in
various network softwarization technologies.
The paper presents the following contributions to the
security study in the 5G Networks a detailed review of 5G
security architecture, a new generation 5G vulnerability
environment, IoT vulnerability environments, and 5G
network threat analyses. The paper also addresses the
guidelines on security, that's to stay, NGMN and ITU-T
define the core 5G security areas in state-of-the-art
literature, and a variety of security concerns related to
main 5G security zones in depth. Highlighting the main
key security challenges belonging to key technologies:
Identify and address the transparent protection and
privacy problems relevant to main 5G high-tech; that say,
CC, NS, SDN, NFV, and MEC. Focus on privacy at 5G,
the study classifies consumer privacy and discusses data
security issues for 5G networks.
The report outlined several policy priorities of the
5G networks in terms of data security and compliance
mechanisms. And lastly a direction for future research:
Based on our results, along with their early approaches
and future guidance, we have outlined the potential and
relevant study issues that need to be tackled. It helps
prospective researchers find their paths for the
prospective.
The rest of this paper is structured as the following: In
section 2, the mobile network Securities are presented
including Mobile network protection and vulnerability
environment evolution, Generation Landscape of
protection, and vulnerability. In section 3, 5G Developed
Security Model are availed and presented including. In
section 4, 5G security's main regions including
communication security, encryption, data access, and
authentication have been presented. Section 5 presents the
conclusion of the article.
We have established telecommunications networks over
four decades and are now at the beginning of the modern
5G broadband networks. With the growing generation of
smartphones alongside, the environment of security for
cellular networks also has improved [33]. The
development of the mobile network security environment
is demonstrated in Figure 4. By the beginning of the
1970s, only phreaking and hacking attacks left telephone
networks vulnerable, and technological progress
dramatically occurred at present [34] and [35].
Telecommunications have demonstrated that an
informatics program has changed dramatically.
Technological evolution occurred in tandem with growing
safety concerns [36].
2.1.1. The 1G Landscape of protection and
vulnerability
In the 1980s, the first mobile or 1G telecommunications
network was formed. It was built on analogue technology.
Only in a single country were 1G cell phones willing to
afford voice call services [37]. 1G data networks were
both named Advanced cell phone Service in the United
States of America, and Nordic Mobile Telephony
throughout the European Union. Roaming and services
were not included in the list of coverage for the 1G
Mobile Network. Nevertheless, with the implementation
of 1G mobile access, network security risks remain.
Technology evolved rapidly mostly over time and
created a complex environment to challenge. In 1G,
hacking of the mobile network became easier because its
radio channel had no cryptography protection owing to its
analogue nature [38]. Hence it is easy to intercept the 1G
calls. When the intruder tries to intercept a message, a
radio scanner must be used and tuned to the appropriate
frequency. The attacker intercepting such calls will access
user identifications, for example, Mobile Identification
Number and Electronic Serial Number [39]. To
impersonate the user, those credentials can be used later
to clone another machine. To deter attackers from
listening to the channel, 1G networks later developed
support for optional analogue scrambling. It was not as
effective as cryptographic methods used in later
generations of mobile devices, but they were able to avoid
some scanning problems with these scrambling
techniques [40].
2. Mobile Network Security
2.1.2. 2G Security and Risk environment
The section presents the fundamental environment of the
5G communication system overall. The whole developed
defined structure is addressed with a broad risk
environment, Landscape of IoT Risks, review of 5G
security vulnerabilities, and ITU-T protection guidelines,
as well as NGMN in this unit.
The 2G telephone services were launched in 1991 after
1G mobile contact. 2G equipped smartphone users with a
voice and messaging service. Introducing the data
services was the first mobile generation, i.e., Quick
Messaging Service (MS) [41]. In addition, it managed 2G
networks in the digital domain. The 2G network provides
a variety of security technologies, such as user
2.1. Mobile network protection and
vulnerability environment evolution
5
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
authentication, man-in-the-medium attacks, impersonation
of the network, spoofing of location notifications, denialof-service attacks like spoofing, and fake encampment for
the base station were also subjected to 3G networks [48].
authentication using shared-secret cryptography, radio
device traffic encryption, and anonymity of user identity
protection. The SIM card used by 2G networks
(Subscriber Identity Module) is a hardware identification
system that holds a crypto function. It must be used on
every smartphone, and it is tested for the identity of the
phone subscriber [42] and [43].
The 2G suffered from a complex range of safety
problems as well. In 2G networks, spamming was used by
attackers as systemic attacks to send unwanted
information to the users. This has contributed to a lot of
malicious code in smartphone users. Attackers were using
malicious code to malicious ends. One of the
implemented hacking processes was interrupting mobile
contact with fake authentication of rogue BSs [44]. In
addition, all flux ciphers, that's to stay, using a text-only
cipher attack, will crack in real-time using A5/1 and A5/2
used by the 2G in securing calls. Because of its store-andforward nature, SMS still has security flaws. The contents
of SMS roaming messages were leaked to foreign
attackers residing on the Internet [45].
2.1.4. 4G Security and Risk Environment
In 2010, 4G was launched for 4G Long Term Evolution
(LTE) and 4G networks, and earlier ones also made
speeds of up to 100 Mbps possible. Using an upper layer
protocol (IP) as a transmission channel provides
awareness of service at each point within the network. 4G
builds on the lessons learned by the 3G and 2G systems
being applied. A new generation of encryption protocols
and a key structure radically diverse from 3G and 2G is
introduced by 4G. Advanced encryption algorithms are
used for 4G, for instance, encryption algorithms and
integrity Algorithms [49].
In comparison, in contrast to the 3G 128-bit keys, all
4G keys are 256-bit large. In addition, 4G supports
diverse traffic control and user-plane algorithms and key
sizes. The key 4G security method and authentication is
known as AKA. (AKA) protocol and use include 3GPP
TS 33.401. The non-access stratum besides the signalling
protocol: radio resource control provides 4G air interface
traffic with credibility and replay protection. The 4G
traffic backhaul will then be encrypted via IPsec protocols
[50].
The 4G-based open all-IP infrastructure is susceptible
to many security attacks. 4G networks continue to suffer
thousands of attacks and emerging challenges to Internet
security, considering the consistent IP connection of the
4G core network to the Web. A wide variety of Internetbased threats, like TCP SYN DoS, IP address spoofing,
User ID hacking, Network Hacking (ToS), intrusion
attacks, and DoS (denial IP address), are vulnerable to 4G
networks [51]. In addition, a certain amount of natural
security was available for pre-4G networks due to the use
of none of the key network IP protocols. This makes the
attacker’s job hard. The attackers were finding it difficult
to understand the complex mobile protocols. This barrier
in 4G has been eased by the IP centre [52].
Furthermore, new 4G portable high-power systems
are perfect outlets for worms, viruses, APT, DoS, and
Botnet, to perform. In addition, several non-3GPP
networks, like WiMAX and Wi-Fi, support 4G networks.
The novel telecom providers with 4G technologies bring
new deals, including fast coverage rates [53]. This also
increased the importance of safety issues, however, APT
and DDoS (Distributed Denial of Service) has a huge
effect on network stability and have contributed to
substantial financial losses. Attackers are trained and
made smarter than wished. The existence of an IP-based
4G mobile network attack has been more difficult to
detect in some of these threats.
2.1.3. 3G Security and risk environment
These results encouraged smartphone researchers to
introduce 3G mobile networking technologies to data
applications and the Internet. Cell phones follow the
simple ICT standards of human life. In 2001, the first
commercial 3G network was introduced by NTT
DoCoMo, using the Multiple Access WCDMA Wideband
Code Division technology to allow access to mobile
Internet. The 3G network bandwidth for mobile stations is
originally 128 Kbps and 2 Mbps for wired systems. Quick
data speeds and innovations like video calls, Multimedia
Message Technologies (MMS), cell TV, and mobile
Internet have been allowed in older 3G network models.
The information gained from 2G protection concerns have
worked to shape stronger 3G network safety mechanisms.
Main vulnerability problems in 2G networks have been
addressed in 3G, like shorter key lengths and a fake attack
by BS [46]. In addition, the security of 3G technologies
and frameworks have been developed in such a manner
that it is possible to expand them and improved them to
counter novel challenges and gratify emerging service
protection necessities.
The security architecture in 3G was composed of five
separate feature sets: (1) protection for the network; (2)
protection for the client network; (3) the security of the
user environment; (4) security for application; and (5)
security visibility and security configuration. Several
security risks to the operating system, user devices, and
the computer were even revealed to 3G cellular phones
[47]. The insecurity of cell phones has led to unauthorized
access to malicious code that contains confidential user
info.
Attacks
like
eavesdropping,
subscriber
impersonation, impersonation of compromised vector
2.1.5. 5G Risk Landscape
6
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
5G gives network infrastructure a mind-blowing upgrade.
It will enable trillions of devices to work better than 4G
devices with greater consistency, conveniences,
speediness, structure efficiency, bandwidth usage, error
tolerance, and dormancy. The 5G generation would
provide a perfect platform for hackers because of IoT, the
wired globe, and vital infrastructure networks. The high
risk of attacks is against the politically and financially
driven profits of perpetrators and practitioners with vast
wealth and technological skills [54]. Thus, the provision
of an acceptable standard of Défense is essential with the
ever-evolving security hazard world of 5G connectivity.
Incorporated transparency and uniform regulation into
standard secrecy, integrity, and usability as two additional
security standards to enhance consumer data security and
privacy, as seen in Figure 5.
Information confidentiality is a key protection feature of
the 5G security model; a property that can secure the
transmission of data from unlawful disclosure and passive
attachments (eavesdropping). All user plane info,
considering the 4G-LTE and 5G architectures, must be
confidential and protected against unauthorized
applications. The implementations of the 5G network
(like, the transport system and medical monitoring [5761] the basic data encryption algorithms have been
commonly used for user privacy. To encrypt or decrypt 5
G data with one private key, you can use the symmetrical
key encryption algorithm. The correspondence actors (like
a transmitter and a recipient) share this.
3.1.2. Integrity
This is to avoid the transition from one stage to another
from tempering and loss of details. 5G Integrity traffic for
NR (New Radio) is parallel to 4G security. Under 5G
New Radio, layer security of the Packet Data
Convergence Protocol (PDCP) is secured from wireless
data traffic. For 4G LTE Integrity protection, the nonaccess stratum, and access stratum [61]. Nevertheless, 5G
New Radio gives the security of the user plane's safety
and a key advantage in 5G reputation protection. The
reputation security of the customer plan was not promoted
by 4G. This is significant. This novel function is
particularly beneficial for minor IoT devices, for small
data transmissions. In addition, integrity-protected
signaling is used in the 5G-AKA authentication
framework. It means that no unauthorized party can
change or view airborne information [62].
3.1.3. Availability
Network accessibility within the 5G realm is structured to
guarantee that system services could be reached anytime
they are requested by legal consumers. as the availability
impacts the service provider's reputation. In other words,
the availability ensures that network infrastructure has a
high probability of effectiveness. It also measures a
network's sustainability against active assaults, such as a
DDoS attack. On the system, DoS attacks would reduce
performance. However, the network coverage could be
attained by at minimum 95 percent and 99.99 percent
correspondingly for 5G apps through the ultra-reliable
machine-type-communication and extreme mobile
broadband [63].
Figure 4. A 5g developed security model
3. 5G Developed Security Model
Not only are the standard audio and video calls restricted
to wireless communication systems. We also endorse a
host of apps that have unlocked up an extensive variety of
testing problems for designers, including household
applications, BYOD (Bring Your Device), cloud services,
social media, games, and shopping. Phreaking is often not
confined to the hacking of general records. Currently, it
has developed into large cyber-attacks rings with
powerful commercial, political, and private agendas [55].
The environment of IoT now has introduced additional
great problems where the system link is initial a range of
susceptibilities inside the 5G system [56].
3.1.4. Unified Security Strategy
The developed structure of 3GPP 4G security in the 5G
network cannot be extended explicitly to the latest 5G
cases because they relate to the conventional operatorsubscriber trust model. To support emerging technology
(like SDN and NFV), a structured security policy
management framework that gives consumers convenient
3.1.1. Confidentiality
7
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
better security for industrialized wireless systems. The
potential vulnerabilities of man-in-the-middle attack
attacks on the Open-Flow controller frequency in the fogIoT, SDN schemes by implementing a feasible attack
scenario into a fog-IoT architecture. The analysis of the SIoT protection environment by offering a taxonomic
overview from a ride, understanding, and stage of
deployment viewpoint.
To define attacks on four levels, including networks,
applications, communication, and device layers, the
creation of the IoT smart water network to create the
Model of risk, Abnormal Behavior Analyses-Intrusion
Detection Systems (ABA-IDS). The authors addressed,
while parts of the communication layer, the approach the
proposed framework is used to protect the secure
gateway. This model can detect a high detection rate of
threats that are known and unknown [78].
access to resources and applications is also required. A
policy-based security management system (VISECO) was
introduced by Thanh et al. to enable a unified security
organization for 5G. The writers contended that mobile
operators would protect their network infrastructure with
the aid of VISECO [64].
3.1.5. Visibility
Visibility allows the E2E-control plane to be aware of
mobile networks. It will handle the basic network
problems effectively to guarantee a safe situation. The 5G
technology can use robust end-to-end encryption
strategies protecting all levels of the network, including
application, signaling, and data planes. 5G operators will
have full visibility, and inspection. To implement such a
rigorous security system, 5 G providers would have
complete visibility, monitoring, and control of total
network layers [65].
5G technology can be paired with transparent APIs
to manage security policies. SaaS (Security-as-a-Service)
could also be approved by operators as a possible option
for some customers, like IoT providers. In this way, the
5G network will provide clear device and hardware
security policies within the network. Enhanced visibility
through security and network policy will help incorporate
dynamic protection frameworks that are suitable for
emerging 5G services. In addition, enhancing visibility
helps data-driven vulnerability monitoring to identify and
separate the diseased devices previously attacks occur
[66, 67].
3.1.7. Endorsements in Security by ITU-T
The security properties that ITU-T practically proposes
are discussed in this subsection. As follows, these
protection properties will address different facets of 5G
domain ICT networks, applications, services, and records.
3.1.7.1.
Access control
Systems prohibit a resource from being used maliciously,
including preventing the use of a resource unlawfully.
These systems (such as role-based management of access)
usually guarantee that just designated customers,
computers, or devices (for example write, read, among
others) are enabled for network resources, files, flows of
information, applications, and services.
3.1.6. Internet of Things Threat Landscape
Due to its attractive and unique features, a lot of interest
has recently been drawn to IoT. The aim is to rely on
millions of mobile computing devices to have a smart
world. Considering Social-IoT based, Industrial-IoT
based, fog-IoT, healthcare-IoT, and smart grids, smart
power-IoT, several smart application networks have been
offered. With the dramatic growth in technologies on the
internet, the possibility of security risks and problems is
also growing exponentially [68, 69]. Not simply is
technology becoming better, but the threats are also
becoming smarter. The issue requires to be urgently fixed.
With its possible solutions Table 1; reveals a few of the
threats found. Many scientists have obtained solutions to
the risks found in various IoT domains.
The solutions to security problems for IoT systems
are challenging because of low latency and high-density
necessities. However, the authors studied statistically,
systematically, and with hybrid detection, Commercial
IoT network vulnerability risks, and identification
schemes. To application designers, this review is
especially helpful [76].
The authors evaluated risks to PLS and the industrial
IoT environment, the plan for a wide variety of Physical
Layer Security (PHY-Sec) technologies offers to fund
3.1.7.2.
Data confidentiality
Many apps capture and forward confidential data to a
variety of stakeholders within a 5G network. In this way,
privacy security protects data from unwanted exposure
and assures that data information can be obtained by
authorized users.
3.1.7.3.
Data integrity
The attribute of Integrity assures that the transit
information is not manipulated or that the information
stays unaltered from source to destination.
3.1.7.4.
Authentication
Person authentication is a tool used by a particular entity
to assert its identity to a separate entity. A method of
authentication will protect against impersonation attacks.
O
8
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
Table 1. Challenges and Strategies for IoT protection
Application
Attacks
Solutions
Protocols
Smart Water system- IoT
Cyber-attacks Security and
Transferred Security.
ABA-IDS
algorithm
Wi-Fi
[70]
IoT-based security components
Authorizations
Authentications
CoAP, MQTT
[71]
Generalized IoT
Eavesdropper collusions
OAuth 2.0based oneM2M
component
PLS
[72]
IoT-based environment
Dolev-Yao threat
Bluetooth,
ZigBee, IEEE
802.15.4
HLPSL
SDN-IoT-Fog
Man-in-the-middle Attack
OpenFlow
[74]
Manufacturing Mobile-IoT
based
Malware
3.1.7.5.
[73]
[75]
This section addresses the most challenging safety issues
in 5G, for instance, connectivity, access management,
authentication, and encryption, applicable to key areas of
protection.
Network availability
This ensures that in regular operations, and even in
disaster relief operations, the network is still available.
Users and applications must be able to access network
incidents that affect the system, like system crashes,
security breaches, and natural disasters.
3.1.7.6.
Signature-based
AKA scheme
Blood filter
method
Dynamic, static,
and hybrid
P
analysis
References
4.1.
Authentication
Authentication plays a major safety function to verify the
identity of users of any contact network. In each
generation of mobile communication, various techniques
had been used for authentication. This section however
illuminates the authentication technique developed by
3GPP specifically for the 5G communication network.
There is a simple authentication division preliminary, the
primary and secondary authentication. In 3GPP
Publication 15, the 3GPP fulfilled the 5G Step 1
regulatory requirement. Requires 5G phase 1 encryption
authentication.
Primary authentication offers shared authentication to
devices and networks in both 4G and 5G. However,
primary authentication has also established slight
variations due to the evolved 5G design. The built-in
home search authentication system manages computer
authentication information and call. Two mandatory
solutions for 5 G phase 1 authentication are 5G-AKA and
Extendable Authentication Protocol (EAP)-AKA.
Special instances, like private networks, optionally
require authentication based on EAP. Because it is
separate from the Radio Access (RA) scheme, in non3GPP technologies, primary authentication will also work
[80]. When the data network authentication is done
outside the authority of a telecom provider is secondary
authentication. In this process similar credentials and
authentication mechanisms based on EAP are valid.
Non-repudiation
This feature would be used to show that a single peer is
the owner of the message or obtained data. The validity of
data or letters is not falsely questioned by this peer when
the message is validated by the private key of the peer.
3.1.8. Risks and commendation by NGMN
Scientific advances introduce complex changes to the
infrastructure design and the needs of the network. In 5G
communications, attributable to a range of related devices,
there seems to be a strong probability that security risks
will develop. In line with network security demands and
specifications, NGMN has given guidelines for its
responses to some of the possible threats [79]. Table. 2,
lists the possible safety risks and NGMN's
recommendations. With many safety issues, for network
management, network slicing, latency, MEC, and a basic
user interface, NGMN has proposed both an explosion of
the existing system and authentication.
4. 5G Security Main Regions
O
9
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
Table 2. Next Generation Mobile Networks Alliance (NGMN) risks and commendation
Area
Endorsements
Reference
Contact is not safe between internetwork slices
Chance of the main leakage
between links of the operator
Blocking services for a variety of
users.
Interaction between all slices, functions, and
interfaces between them is managed and safe.
Powerful protection relation between operators
or a new key sharing method
A sequence of defenses of overload, method of
security overload, and design of new
frameworks
[76]
MEC
Offering a third-party security firm
[79]
Latency
Mechanism of protection for
latency goals
Expose protection resources only to
trustworthy apps.
Adjustments in the 3GPP architecture,
transferring the encryption mechanism to the
lower layer.
Network Slicing
Access network
DoS Attack
Threats
[77]
[78]
[80]
P
Shared authentication and the supply of keyword
content between the network and the UE can be done
through key control and primary authentication
procedures. The authentication protocols for the primary
key and control require an essential key known as
KSEAF. For network server SEAF, KSEAF provides the
home network authentication service (AUSF) feature. The
NF (Network Function) and AUSF provide UE
authentication as per 3GPP and ETSI for NF petitioners in
the core network of 5G. It permits the customer of the NF
service to provide UE authenticated access and mobile
management capabilities (AMF). For accomplishing the
authentication, NF gives AUSF the identity of UEs and
uses the name of the network. The info gained by AMF
now AUSF is using the information for authentication
based on the 5G-AKA or EAP [64].
Other researchers have studied 5G frameworks for
security threats to different risks and scenarios.
Conducted a systematic review of the 5G AKA protocol
that included correct specifications from the 3GPP 5G
guidelines and highlight the missed safety targets [73]. To
authenticate BS, the necessity in the current 5G
authentication protocol is met by an algorithm-supplied
study above 5G-AKA. This has exposed 5G-reliance
AKAs on the underlying infrastructure. The device
vulnerability is abused by a restoration of the attack on
5G or protocol [74].
An analysis of 4G and 5G, and problems with AAA
(Authentication
Authorization
and
Accounting)
implementation flaws. The consistency of the current
Universal Subscriber Identity Modules with the 5G AKA
full privacy protocol. In compliance with the
heterogeneous 5G network criteria, an innovative
community-based AKA threat model has been suggested
by the authors [60]. Except for the IMSI-catcher attack,
all recorded 5G-AKA attacks are still valid and have
supported an updated preventive version of 5G-AKA
[75].
4.2.
To regulate selectively access to the network is the
primary goal for access control. For providing reliable and
harmless communication networks Access control
systems have since been operated by network operators.
For any network protection program, this is the key
building block. The access management process just
ensures access to the network by authorized users [77].
Network decentralization of some of the recent access
management
systems
improves
the
network
infrastructure’s stable setting. An entry selection scheme
alongside several eavesdroppers was suggested for D2D
PLS [78]. In the current scheme, D2D networking
systems are sharing bandwidth with cellular users in
respect of distance thresholds. The authors caused
interference that the authors used jamming to deceive
eavesdroppers. The eavesdropper security norm was
optimized by the optimum achievement of the access
filtering scheme throughput. The security pair D2D is
used to secure one single person.
An automated ConfigSynth system was developed to
provide a precise network configuration that is affordable
and synthesizing [79]. The proposed structure is further
refined by creating a refinement mechanism to provide
greater protection. Isolation is given by the suggested
algorithm, improving traffic flow and safety system
sharing. To prevent downgrade attacks with a fake LTE
BS from IMSI (International Mobile Subscriber Identity),
advocated using an existing approach based on
pseudonyms and a method to change LTE pseudonyms.
An attack called RPEDO is addressed to find security
problems with the paging protocol [80].
A collection of proposed access control approaches
has been presented by numerous scholars focused on key
distribution, encryption, and authentication. To ensure
user safety, Transparent and APAC (Privacy-Enhanced
Access Control) were suggested. The protocol's validity
by implementing minimal experimental tools. A special
biometric-password authentication scheme for the
information system. Without remote server participation,
the
proposed
methodology
provides
secrecy,
confidentiality, less computational expense, and effective
authentication [81].
Access control
10
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
O
Table 1. Security concerns linked to 5G communication issues
Attacked part
Threat
Definition
Reference
Botnet
A botnet is a form of malware capable of exploiting a
series of computers connected to the internet.
[65]
Attacks through Mobile
Malware
Mobile malware helps attackers to harvest private
information stored on a computer.
Attacks focused upon
evidence of incorrect
buffer status
To gain data like load balancing, packet scheduling,
and algorithms for admission control.
[66]
Message Threat injection
The DoS attacks would be triggered by Message
Injection Attacks on 5G networks.
[67]
Microcell Attacks
BSs' overall footprint is greatly diminished and there
are enclosed spaces like stadiums, public houses,
malls, and hospitals.
DDoS attacks can be carried out using a botnet to
monitor many infected UEs in the type of Signals
Propagation and HSS overload.
Attack assaults are vulnerable to SDN-based TLS or
SSL contact.
Through monitoring SDN traffic hackers
[69]
User Equipment
Access Network
Denial-of-service Attack
Core Network
TLS/SSL Attacks
SDN Scanner
[70]
[71]
[72]
P
networks.
To
establish
ICC
(Inter-Controller
Communication), the east or west-bound interface among
these several SDN controllers is used. It aids execute
various network functions in the sharing of control
information, such as coordination of security policies,
managing of mobility, traffic control, and surveillance of
networks [85].
An access control scheme focused on updating the
encrypted message and computation servicing for IoT in
fog computing. User data is ABE-encrypted and then
stored in the cloud [82]. A stable and productive safety
scheme was provided. Centered on CP-ABPRE (Cipher
Text-Policy Attribute-Based Proxy Re-Encryption) and
top-secret distribution, the data distribution of a security
system for several customers of OSNs (Online Social
Networks) was implemented. A portion decryption design
to decrease user overhead computing by assigning
decryption processes to OSNs, checking the capacity of
OSN to cross-check decrypted data, and attributing
reversal methods for backward and forward secrecy [83].
Classification of 5G core network traffic, like
customer data traffic and traffic management, into two
forms. Several of these forms of traffic are prone to
specific security attacks. The absence of protection at the
IP level is the main security issue relating to traffic
management. Upper layer authentication protocols like
TLS (Transport Layer Security) or SSL (Protected
Sockets Layer) connections are used to defend the control
channel on the current SDN-based 5G core network. At
the IP level, they have recognized weaknesses, like
Spoofing, message manipulation attacks, eavesdroppers’
attacks, IP spoofing, TCP SYN DoS, and TCP reboot
attacks [84].
Consequently, it is important for using IP-level safety
features alongside higher layer protection mechanisms. In
wide SDN networks, several SDN controllers have been
used for controlling small network sections like cell
4.3.
Encryption
Encryption is of particular importance for ensuring data
confidentiality. E2Eencryption is important in the 5G
environment, Because of the rich variety of novel internet
services. This will be used to block overlooked segments
of the network from unwanted conations to mobile data.
Network data will be encrypted at the PDCP (Packet Data
Convergence Protocol) layer in 5G. The user plan uses
three separate 128-bit secret keys, the NAS (Non-Access
Stratum) and the AS (Access Stratum), equivalent to the
4G LTE network. Moreover, to this, the 5G Modern
Radio (NR) can use some of the 4G encryption algorithms
[86].
The same EPS Encryption Algorithms (EEA) based
null, SNOW 3G and AES (Advanced Encryption
Standard) algorithms could also be used in 5G according
to the 3GPP 5G standards. In 5G, however, the identifiers
have been altered. 5G redefines 4G EPS Encryption
Algorithm (EEA) as NR Encryption Algorithm (NEA).
11
Endorsed
Transactionson
on
EAI EAI
Endorsed
Transactions
Internet of Things
......................................
.................-.............. 2013 | Volume .... | Online
Issue First
........ | e...
F. Shokoor, W. Shafik and S. M. Matinkhah
One of the most important 5G traffic speeds is URLLC
(Ultra-Reliable Low Latency Communication) [87].
areas was covered in our study, including access control,
authentication, communication protection, and encryption.
4.4.
Acknowledgements.
Communication security
The authors in nutshell would like to distinguish the
support and comments shared with us by the computer
engineering department members to attain this paper's
quality.
To endorse a wide variety of vertical elements in 5G Eco
networks, 5G Connectivity aims to have high network
speed, low latency connectivity, and wide signal
coverage. Therefore, along with design updates and
emerging infrastructure incorporation, 5G communication
would be updated. Though, these enhancements can also
cause major security problems for future 5G mobile
networks [88].
Attacks will be carried out on 5 G networking in
various parts, like UEs, access networks, and the core
mobile operator network. The attacks associated with
numerous 5G communication sections are also
summarized in Tab. 3, to better explain the possible
security vulnerabilities and risks concerning 5G
communication. Attacks and threats on traditional mobile
networks can also be discussed (such as 4G, 3G, and 2G).
Any of these attacks are also taking place on 5G networks
[89].
In addition, in protecting privacy, 5G cryptography
plays an important role. In required to conform with the
current regulations on privacy in Europe, such as GDPR
(General Data Protection Regulation) and the continuing
review of the Privacy Directive, it is also essential to
mention that the need for private security in 5G networks
is a major priority. Consequently, 5G systems are
configured to provide user privacy rights. All these longterm and short-term user identities are secured by
consuming a cover-up system focused on the ECIES
(Elliptic Curve Integrated Encryption Scheme) and using
the public key of the home operator [90] and [91].
In turn, the IMSI encryption is going to be included
in 5G to prevent IMSI catcher threat. IMSI gathers and
monitors customers. This is violating their privacy [92].
To accomplish this purpose, the authors suggest a new
IMSI encryption algorithm. A new pair with its random
number and asymmetric public or private key desires to
be generated by a mobile application. In 5G it's possible
because existing USIMs can now perform randomized
asymmetric encryption [93-95].
Data Availability Statement: All the data that was
used to support the results of this study are encompassed
within the paper.
Funding Statement: The authors received no specific
funding for this study.
Conflicts of Interest: The authors declare that they
have no conflicts of interest to report regarding this study.
References
[1]
M. Agarwal, A. Roy and N. Saxena, "Next generation 5g
wireless networks: a comprehensive survey," IEEE
Communication Surveys and Tutorial. vol. 18, no. 3, pp.
1617–1655, 2016.
[2] L. Zhao, D. Zhu, W. Shafik, S. M. Matinkhah, Z. Ahmad
et al., “Artificial intelligence analysis in cyber domain: A
review,” International Journal of Distributed Sensor
Networks, vol. 18, no. 4, pp. 15501329221084882, 2022.
[3] W. Shafik, S. M. Matinkhah, F. Shokoor and L. Sharif, “A
reawakening of machine learning application in unmanned
aerial vehicle: future research motivation,” EAI Endorsed
Trans. Internet Things, vol. 8, no. 29, pp. e3–e3, 2022.
[4] A. Irshad, S. A. Chaudhry, A. Ghani and M. Bilal, "A
secure blockchain-oriented data delivery and collection
scheme for 5G-enabled IoD environment" Computer
Networks, vol. 195, pp. 108219, 2021.
[5] W. Shafik, S. M. Matinkhah and F. Shokoor,
“Recommendation system comparative analysis: internet
of things aided networks”, EAI Endorsed Trans IoT, vol. 8,
no. 29, pp. 5, 2022.
[6] G. Maier and M. Reisslein, "Transport sdn at the dawn of
the 5g era," Optical Switching and Networking, vol. 33,
pp. 34-40, 2019.
[7] W. Shafik, S. M. Matinkhah, S. S. Afolabi and M. N.
Sanda, “A 3-dimensional fast machine learning algorithm
for mobile unmanned aerial vehicle base stations,”
International Journal of Advances in Applied Sciences,
vol. 2252, no. 8814, pp. 8814, 2020.
[8] H. Meng, W. Shafik, S. M. Matinkhah and Z. Ahmad, “A
5g beam selection machine learning algorithm for
unmanned aerial vehicle applications,” Wirel. Commun.
Mob. Comput., 2020.
[9] M. S. Bonfim, K. L. Dias and S. F. L. Fernandes,
"Integrated nfv/sdn architectures: a systematic literature
review," ACM Computing Surveys, vol. 51, no. 6, 2020.
[10] W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “A
fast machine learning for 5g beam selection for unmanned
aerial vehicle applications,” Journal of Information
5. Conclusion
The 5G network environment is changing rapidly,
creating an increasing variety of security risks at multiple
levels and implementations. Via spectacular views
analyses and discussions focused on current literature, this
paper addressed the 5G security challenge and sought to
provide an accurate interpretation of security concerns.
The comprehensive 5G security model analysis, next
generation 5G threat setting, IoT threat scenarios, and 5G
threat research of the network have been investigated. A
detailed review of security problems in core 5G security
12
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
Systems and Telecommunication, vol. 7, no. 28, pp. 262–
278, 2019.
W. Shafik, S. M. Matinkhah and M. Ghasemzadeh, “A
mobile fuzzy sink scheme for wireless sensor network
period improvement,” 8th Iranian Joint Congress on Fuzzy
and intelligent Systems, Mashhad, Iran, pp. 211–216,
2020.
S. Kitanov, B. Popovski and T. Janevski, "Quality
evaluation of cloud and fog computing services in 5g
networks," Enabling Technologies and Architectures for
Next-Generation Networking Capabilities, pp. 1-36, 2019.
A. Irshad, S. A. Chaudhry, A. Ghani, G. A. Mallah, M.
Bilal, B. A. Alzahrani, "A low-cost privacy preserving user
access in mobile edge computing framework" Computers
& Electrical Engineering, vol. 98, 107692, 2022.
W. Shafik, M. Matinkhah, M. Asadi, Z. Ahmadi and Z.
Hadiyan, “A study on internet of things performance
evaluation,” Journal of Communications Technology,
Electronics and Computer Science, pp. 1–19, 2020.
S. A. Chaudhry, A. Irshad, M. M. Khan, S. A. Khan, S.
Nosheen, A. A. AlZubi, and Y. B. Zikria "A Lightweight
authentication scheme for 6G-IoT enabled maritime
transport system." IEEE Transactions on Intelligent
Transportation Systems, 2021.
R. Ahmed, A.K. Malviya, M.J. Kaur and V.P. Mishra,
"Comprehensive survey of key technologies enabling 5giot," 2nd International Conference on Advanced
Computing and Software Engineering (ICACSE),
Siltanpur, UP, India, pp.1-5, 2019.
L. Shao-Yu, C.C. Tseng, I. Moerman and L. Badia,
"Recent advances in 5g technologies," New Radio Access
and Networking, pp. 1-9, 2019.
W. Shafik and S. M. Matinkhah, “Admitting new requests
in fog networks according to erlang b distribution,” 27th
Iranian Conference on Electrical Engineering, Yazd, Iran,
2019.
A. Irshad, S. A. Chaudhry, M. Alazab, A. Kanwal, M. S.
Zia and Y. B. Zikria, "A secure demand response
management authentication scheme for smart grid."
Sustainable Energy Technologies and Assessments, 48,
101571, 2021.
M. Azrour, J. Mabrouki, A. Guezzaz et al., "Internet of
Things Security: Challenges and Key Issues" Security and
Communication Networks, 2021.
A. Gupta and R.K. Jhk, "a survey of 5g network:
architecture and emerging technologies", IEEE Journals &
Magazine, vol.3, pp. 1206-1232, 2020.
[22] Y. Jun, A. Craig, W. Shafik and L. Sharif, “Artificial
intelligence
application
in
cybersecurity
and
cyberdefense,”Wireless Communications and Mobile
Computing, vol. 2021.
S. M. Matinkhah, W. Shafik and M. Ghasemzadeh,
“Emerging artificial intelligence application: reinforcement
learning issues on current internet of things,” in 2019 16th
international Conference in information knowledge and
Technology, Tehran, Iran, 2019.
A. Gohil, H. Modi and S.K. Patel, "5G technology of
mobile communication: A survey," International
Conference on Intelligent Systems and Signal Processing
(ISSP), Gujarat, pp. 288–292, 2013.
N. Panwar, S. Sharma and A.K. Singh, "A survey on 5G:
The next generation of mobile communication," Physical
Communication, vol. 18, pp. 64–84, 2016.
M. Jaber, M.A. Imran, R. Tafazolli and A. Tukmanov, "5G
backhaul challenges and emerging research directions: a
survey," IEEE Access, vol. 4, pp. 1743–1766, 2016.
[27] R.N. Mitra and D.P. Agrawal, "5G mobile technology: A
survey," ICT Express, vol. 1, no. 3, pp. 132–137, 2015.
[28] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M.
Ylianttila and A. Gurtov, "Overview of 5g security
challenges and solutions," IEEE Communication Standard
Magazine, vol. 2, no. 1, pp. 36–43, 2018.
[29] M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos and
H. Janicke, "Security for 4G and 5G cellular networks: A
survey of existing authentication and privacy-preserving
schemes," Journal of Network Computing Application,
vol. 101, pp. 55–82, 2018.
[30] G. Choudhary and V. Sharma, "A survey on the security
and the evolution of osmotic and catalytic computing for
5g networks," in 5G Enabled Secure Wireless Networks,
Springer International Publishing, pp. 69–102, 2019.
[31] M. Chen, Y. Qian, S. Mao, W. Tang and X. Yang,
"Software-defined mobile networks security," Mobile
Network Application, vol. 21, no. 5, pp. 729–743, 2016.
[32] P. Gandotra and R.K. Jha, "A survey on green
communication and security challenges in 5G wireless
communication networks," Journal of Network Computing
Application, vol. 96, pp. 39–61, 2017.
[33] W. Shafik, S. M. Matinkhah, and M. Ghasemazade, “Fogmobile edge performance evaluation and analysis on
internet of things,” Journal of Advance Research in Mobile
Computing, vol. 1, no. 3, pp. 1–17, 2019.
[34] Z. Yang, L. Jianjun, H. Faqiri, W. Shafik, A. T.
Abdulrahman, Yusuf M, Sharawy AM. et al., “Green
internet of things and big data application in smart cities
development,” Complexity, 2021.
[35] W. Shafik and S. M. Matinkhah, “How to use Erlang B to
determine the blocking probability of packet loss in a
wireless communication,” 13th Symposium on Advances
in Science & Technology, Mashhad, Tehran 2018.
[36] Y. Lin, Z. Ahmad, W. Shafik, S. K. Khosa, Z. Almaspoor
et al., “Impact of facebook and newspaper advertising on
sales: a comparative study of online and print media,”
Computational intelligence and neuroscience, 2021.
[37] Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A survey on
wireless security: technical challenges, recent advances,
and future trends," IEEE Journals & Magazine, vol. 104,
no. 9, pp. 1727-1765, 2020.
[38] Y.E.H.E. Idrissi, N. Zahid and M. Jedra, "Security analysis
of 3gpp (lte) — wlan interworking and a new local
authentication method based on eap-aka," in The First
International
Conference
on
Future
Generation
Communication Technologies, London, England, pp. 137–
142, 2012.
[39] M. Liyanage and A. Gurtov, "Secured vpn models for lte
backhaul networks," in IEEE Vehicular Technology
Conference (VTC Fall), Quebec City, Canada, pp. 1–5,
2012.
[40] W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh,
“Internet of things-based energy management, challenges,
and solutions in smart cities,” Journal of Communications
Technology, Electronics and Computer Science., vol. 27,
pp. 1–11, 2020.
[41] M. Liyanage, M. Ylianttila and A. Gurtov, "Ip-based
virtual private network implementations in future cellular
networks," Handbook of Research on Progressive Trends
in Wireless Communications and Networking, pp. 44-66,
2020.
[42] S. Gold, "The rebirth of phreaking," Network Security, vol.
2011, no. 6, pp. 15-17, 2011.
[43] J. Granjal, E. Monteiro and J. Sá Silva, "Security for the
internet of things: a survey of existing protocols and open
13
EAI Endorsed Transactions on
Internet of Things
Online First
F. Shokoor, W. Shafik and S. M. Matinkhah
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
research issues," IEEE Communication Survey Tutorial,
vol. 17, no. 3, pp. 1294–1312, 2015.
W. Shafik and S. A. Mostafavi, “Knowledge engineering
on internet of things through reinforcement learning,”
International Journal of Computer Applications, vol. 975,
pp. 8887, 2019.
W. Shafik, M. Matinkhah, and M. N. Sanda, “Network
resource management drives machine learning: a survey
and future research direction,” Journal of Communications
Technology, Electronics and Computer Science, pp. 1–15,
2020.
W. Shafik and S. M. Matinkhah, “Privacy issues in social
Web of things,” 5th International Conference on Web
Research, Tehran, Islamic Republic of Iran, pp. 208–214.
X. Zhang, A. Kunz and S. Schröder, "Overview of 5g
security in 3gpp," in IEEE Conference on Standards for
Communications and Networking (CSCN), Helsinki,
Finland, pp. 181–186. 2017.
M. H. Eiza, Q. Ni and Q. Shi, "Secure and privacy-aware
cloud-assisted video reporting service in 5g-enabled
vehicular networks," IEEE Transaction on Vehicular
Technology, vol. 65, no. 10, pp. 7868–7881, 2016.
Z. Chen, F. Zhang, P. Zhang, J.K. Liu and J. Huang,
"Verifiable keyword search for secure big data-based
mobile healthcare networks with fine-grained authorization
control," Future Generation Computer System, vol. 87, pp.
717-724, 2018.
W. Shafik, M. Matinkhah, P. Etemadinejad, and M. N.
Sanda, “Reinforcement learning rebirth, techniques,
challenges, and resolutions,” International Journal on
Informatics Visualization, vol. 4, no. 3, pp. 127–135, 2020.
S. M. Matinkhah and W. Shafik, “Smart grid empowered
by 5G technology,” in 2019 Smart Grid Conference
(SGC), Tehran, Iran, pp. 1–6, 2019.
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh,
“Theoretical understanding of deep learning in uav
biomedical engineering technologies analysis,” SN
Computer Science, vol. 1, no. 6, pp. 1–13, 2020.
S. Choi, J. Song, J. Kim, S. Lim, S. Choi, etl., "5g ksimnet: end-to-end performance evaluation of 5g cellular
systems,"
in
16th
IEEE
Annual
Consumer
Communications & Networking Conference (CCNC), Las
Vegas, United States of America, pp. 1-6, 2019.
S. Gupta, B.L. Parne and N.S. Chaudhari, "Security
vulnerabilities in handover authentication mechanism of 5g
network," in First International Conference on Secure
Cyber Computing and Communication (ICSCCC),
Jalandhar, India, pp. 369–374, 2018.
M. S. Berger and H. L. Christiansen, "Fronthaul for cloudran enabling network slicing in 5g mobile networks,"
Wireless Communications and Mobile Computing, vol.
2018, 2020.
W. Shafik and S. M. Matinkhah, “A Portable Fuzzy sink
scheme for wireless sensor network life expectancy
enhancement,” IEEE Iranian Joint Congress on Fuzzy and
intelligent Systems, 2020.
S. M. Matinkhah and W. Shafik, “A study on financial
pricing and applications models on 5g,” 4th International
Conference in Financial Mathematics, Yazd, Iran, pp. 5460, 2019.
S. M. Matinkhah and W. Shafik, “Broadcast
communication analysis for 5g media radio access
networks,” In 16th Conference on Broadcast and
Exhibition, Tehran, Iran, 2019.
T.Q. Thanh, S. Covaci and T. Magedanz, "Viseco: an
annotated security management framework for 5g,"
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
14
In International Conference on Mobile, Secure, and
Programmable Networking, Mohammedia, Morocco pp.
251-269, 2018.
F. Al-Turjman, "5g-enabled devices and smart-spaces in
social-iot: an overview," Future Generation Computing
System, vol. 92, pp. 732–744, 2019.
M. Agiwal, N. Saxena and A. Roy, "Towards connected
living: 5g enabled internet of things (iot)," IETE Technical
Review, vol. 36, no. 2, pp. 190-202, 2019.
S. Sharmeen, S. Huda, J.H. Abawajy, W.N. Ismail and
M.M. Hassan, "Malware threats and detection for
industrial mobile-iot networks," IEEE Access, vol. 6, pp.
15941–15957, 2018.
F. Jameel, M.A. Javed, D.N.K. Jayakody and S.A. Hassan,
"On secrecy performance of industrial internet of things,"
Internet Technology Letters, vol. 1, no. 2 pp. 1-32, 2020.
S. Mostafavi and W. Shafik, “Fog computing architectures,
privacy
and
security
solutions,”
Journal
of
Communications Technology, Electronics and Computer
Science, vol. 24, pp. 1–14, 2019.
W. Shafik, S. M. Matinkhah, M. N. Sanda, and F. Shokoor,
“Internet of things-based energy efficiency optimization
model in fog smart cities,” International Journal on
Informatics Visualization, vol. 5, no. 2, pp. 105–112, 2021.
W. Shafik and S. M. Matinkhah, “Unmanned aerial
vehicles analysis to social networks performance,” CSI
Journal on Computer Science and Engineering, vol. 18, no.
2, pp. 24-31, 2021.
F. Pan, Z. Pang, M. Luvisotto, M. Xiao and H. Wen,
"Physical-layer security for industrial wireless control
systems: basics and future directions," IEE Industrial.
Electronic Magazine, vol. 12, no. 4, pp. 18–27, 2018.
C. Li, Z. Qin, E. Novak and Q. Li, "Securing sdn
infrastructure of iot–fog networks from mitm attacks,"
IEEE Internet Things Journal, vol. 4, no. 5, pp. 1156–1164,
2017.
W. Shafik, S. M. Matinkhah and S. "Dimensional fast
machine learning algorithm for mobile unmanned aerial
vehicle base stations," International Journal of Advances in
Applied Sciences, 2252, no. 8814, pp. 8814, 2020.
M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating
critical security issues of the iot world: present and future
challenges," IEEE Internet of Things Journal, vol. 5, no. 4,
pp. 2483–2495, 2018.
J. Pacheco, D. Ibarra, A. Vijay and S. Hariri, "IoT security
framework for smart water system," in IEEE/ACS 14th
International Conference on Computer Systems and
Applications (AICCSA), Hammamet, Tunisia, pp. 1285–
1292, 2017.
S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury
and E. Bertino, "Insecure connection bootstrapping in
cellular networks," Proceedings of the 12th Conference on
Security and Privacy in Wireless and Mobile Networks,
Miami, Florida, pp. 1-11, 2019.
C. Cremers and M. Dehnel-Wild, "Component-based
formal analysis of 5G-AKA channel assumptions and
session confusion," Network and Distributed System
Security Symposium (NDSS), pp. 21-27, 2019.
R. Borgaonkar, L. Hirschi, S. Park and A. Shaik, "New
privacy threat on 3g, 4g, and upcoming 5g aka protocols,"
Proceeding on Privacy Enhancing Technology, vol. 2019,
no. 3, pp. 108–127, 2019.
S. Behrad, E. Bertin and N. Crespi, "Securing
authentication for mobile networks, a survey on 4G issues
and 5G answers," in 21st Conference on Innovation in
EAI Endorsed Transactions on
Internet of Things
Online First
Overview of 5G & Beyond Security
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93] K. Yan, W. Shen, Q. Jin and H. Lu, "Emerging privacy
issues and solutions in cyber-enabled sharing services:
from multiple perspectives," IEEE Access, vol. 7, pp.
26031–26059, 2019.
[94] P.F. Scott, "Secrecy and surveillance: lessons from the law
of imsi catchers," International Review of Law, Computers
and Technology, vol. 33, no. 3, pp. 349-371, 2019.
[95] A. Braeken, M. Liyanage, P. Kumar and J. Murphy,
"Novel 5g authentication protocol to improve the
resistance against active attacks and malicious serving
networks," IEEE Journals & Magazine, vol. 7, pp. 64040 64052, 2019.
Clouds, Internet and Networks and Workshops (ICIN),
Paris, France, pp. 1–8, 2018.
J. Arkko, K. Norrman, M. Näslund and B. Sahlin, "A usim
compatible 5g aka protocol with perfect forward secrecy,"
in IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 1205–
1209, 2015.
A. Koutsos, "The 5g-aka authentication protocol privacy,"
in IEEE European Symposium on Security and Privacy
(EuroS P), Stockholm, Sweden, pp. 464–479, 2019.
L. Wang, J. Liu, M. Chen, G. Gui and H. Sari,
"Optimization-based access assignment scheme for
physical-layer security in d2d communications underlying
a cellular network," IEEE Transaction Vehicular
Technology, vol. 67, no. 7, pp. 5766–5777, 2018.
M.A. Rahman and E. Al-Shaer, "Automated synthesis of
distributed network access controls: a formal framework
with refinement," IEEE Transaction Parallel Distributed
System, vol. 28, no. 2, pp. 416–430, 2017.
M. Khan, P. Ginzboorg, K. Jarvinen and V. Niemi,
"Defeating the downgrade attack on identity privacy in
5g," In International Conference on Research in Security
Standardisation, Darmstadt, vol. 11322, pp. 95-119, 2018.
D. He, S. Chan and M. Guizani, "Accountable and privacyenhanced access control in wireless sensor networks,"
IEEE Transaction. Wireless Communication, vol. 14, no.
1, pp. 389–398, 2015.
S. Chatterjee, "On the design of fine grained access control
with user authentication scheme for telecare medicine
information systems," IEEE Access, vol. 5, pp. 7012–
7030, 2017.
Q. Huang, Y. Yang and L. Wang, "Secure data access
control with ciphertext update and computation
outsourcing in fog computing for internet of things," IEEE
Access, vol. 5, pp. 12941–12950, 2017.
H. Qinlong, M. Zhaofeng, Y. Yixian, N. Xinxin and F.
Jingyi, "Improving security and efciency for encrypted
data sharing in online social networks," China
Communication, vol. 11, no. 3, pp. 104–117, 2014.
P.P. Sriram, H.C. Wang, H. G. Jami and K. Srinivasan, "5g
security: concepts and challenges," in 5G Enabled Secure
Wireless Networks, Springer International Publishing, pp.
1–43, 2019.
J. Yao, Z. Han, M. Sohail and L. Wang, "A robust security
architecture for sdn-based 5g networks," Future Internet,
vol. 11, no. 4, 2019.
M. Liyanage, A.B. Abro, M. Ylianttila and A. Gurtov,
"Opportunities and challenges of software-defined mobile
networks in network security," IEEE Security and Privacy,
vol. 14, no. 4, pp. 34–44, 2016.
M.C. Dacier, H. König, R. Cwalinski, F. Kargl and S.
Dietrich, "Security challenges and opportunities of
software-defined networking," IEEE Security and Privacy,
vol. 15, no. 2, pp. 96–100, 2017.
A. R. Prasad, "3gpp 5g security," Journal of ICT
Standardization, vol. 6, no. 2, pp. 137-158, 2018.
R. P. Jover and V. Marojevic, "Security and protocol
exploit analysis of the 5g specifications," IEEE Access,
vol. 7, pp. 24956–24963, 2019.
V. Saraswat, R.A. Sahu, G. Sharma, V. Kuchta and O.
Markowitch, "Public-key encryption with integrated
keyword search," Journal of Hardware System and
Security, vol. 3, no. 1, pp. 12–25, 2019.
C. Li and B. Palanisamy, "Privacy in internet of things:
from principles to technologies," IEEE Internet Things
Journal, vol. 6, no. 1, pp. 488–505, 2019.
15
EAI Endorsed Transactions on
Internet of Things
Online First