Securing Internet of Things in 5G Era
VerifiedAdded on 2023/03/30
|15
|3400
|363
AI Summary
This article discusses the security challenges and possible solutions for securing Internet of Things in the 5G era. It covers topics such as 5G wireless communication system, benefits of 5G, vulnerability to security threats, and possible solutions. Find study material and solved assignments on Desklib.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SECURING INTERNET OF THINGS IN 5G ERA
By Name
Course
Instructor
Institution
Location
Date
By Name
Course
Instructor
Institution
Location
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Background
5G wireless network vision revolves around the provision of very high rates of data as well as
better coverage via dense deployment of base station with enhanced capacity, relatively better
Quality of Service as well as lowest latency attainable. Proper networking, storage, deployment
of service, processing as well as storage methods are needed to attain the necessary services as
envisioned by 5G. Cloud computing offers one of the most efficient ways for maintaining data,
applications as well as services for the operators without necessarily having to win the
infrastructure for such roles (Ahmad et al., 2017). Hence, mobile clouds that adopt the very
concept is likely to come along with systems that are technologically distinct into one domain
where numerous services may be deployed to attain enhanced levels of flexibility as well as
availability with as low Capital of Expenditure as well as Operational Expenses as possible.
Higher flexibility, as well as easier portability, will be enabled of the systems and services of the
network through softwarizing the functions of network. Software Defined Network allows the
softwarizing of a network functions through the separation of network control plane from data
forwarding planes. Software Defined Network invokes innovation in networking via abstraction
as well as simplification of the management of network (Ahmad et al., 2018). Network Function
Virtualization offers the platform for placement of different network functions in various
perimeters of the network on the basis of need and removes the service or function specific
hardware need. Software Defined Network and Network Function, working in conjunction,
enhance the elasticity of network, results in simplification of the management and control of a
network, eliminates the vendor-specific prosperity options barriers hence perceived to be of great
importance for future networks.
5G wireless network vision revolves around the provision of very high rates of data as well as
better coverage via dense deployment of base station with enhanced capacity, relatively better
Quality of Service as well as lowest latency attainable. Proper networking, storage, deployment
of service, processing as well as storage methods are needed to attain the necessary services as
envisioned by 5G. Cloud computing offers one of the most efficient ways for maintaining data,
applications as well as services for the operators without necessarily having to win the
infrastructure for such roles (Ahmad et al., 2017). Hence, mobile clouds that adopt the very
concept is likely to come along with systems that are technologically distinct into one domain
where numerous services may be deployed to attain enhanced levels of flexibility as well as
availability with as low Capital of Expenditure as well as Operational Expenses as possible.
Higher flexibility, as well as easier portability, will be enabled of the systems and services of the
network through softwarizing the functions of network. Software Defined Network allows the
softwarizing of a network functions through the separation of network control plane from data
forwarding planes. Software Defined Network invokes innovation in networking via abstraction
as well as simplification of the management of network (Ahmad et al., 2018). Network Function
Virtualization offers the platform for placement of different network functions in various
perimeters of the network on the basis of need and removes the service or function specific
hardware need. Software Defined Network and Network Function, working in conjunction,
enhance the elasticity of network, results in simplification of the management and control of a
network, eliminates the vendor-specific prosperity options barriers hence perceived to be of great
importance for future networks.
Problem Statement
Wireless communication systems have been subjected to numerous security vulnerabilities since
time they were established. Wireless channels, as well as mobile phones, were in the first
generation a target for masquerading and illegal cloning. Message spamming was a common
phenomenon in the second generation for both pervasive attacks as well as injection of untrue
information or even broadcasting information that is unwanted in the market. The 3G generation
networks were as well not spared (Arfaoui et al., 2018). This generation was accompanied by IP
communication that allowed relocation of vulnerabilities of internet security as well as
challenges noted in the wireless domains.
The 4G mobile networks, with enhanced need for IP based communication, allowed the entry of
smart devices, new services as well as multimedia traffic into the domain of the mobile industry.
Such a development resulted in a more sophisticated as well as dynamic landscape of threat.
With the arrival of 5G wireless networks, it is anticipated that the vectors of security that be
increased in size than the ones that existed prior with enhanced concern for privacy issues. It is
this of importance to highlight the likely challenges with regard to the security of 5G networks
which threaten as a result of the wire form of the mobile networks as well as the presence of
possible innovations that are quite critical for 5G. The security challenges that are at the center
stage of 5G alongside the need for quick security measures are thus discussed at length (Hasnat
et al., 2019).
Research Questions
The following research questions should be addressed by the end of this research:
What is the 5G wireless communication system?
Wireless communication systems have been subjected to numerous security vulnerabilities since
time they were established. Wireless channels, as well as mobile phones, were in the first
generation a target for masquerading and illegal cloning. Message spamming was a common
phenomenon in the second generation for both pervasive attacks as well as injection of untrue
information or even broadcasting information that is unwanted in the market. The 3G generation
networks were as well not spared (Arfaoui et al., 2018). This generation was accompanied by IP
communication that allowed relocation of vulnerabilities of internet security as well as
challenges noted in the wireless domains.
The 4G mobile networks, with enhanced need for IP based communication, allowed the entry of
smart devices, new services as well as multimedia traffic into the domain of the mobile industry.
Such a development resulted in a more sophisticated as well as dynamic landscape of threat.
With the arrival of 5G wireless networks, it is anticipated that the vectors of security that be
increased in size than the ones that existed prior with enhanced concern for privacy issues. It is
this of importance to highlight the likely challenges with regard to the security of 5G networks
which threaten as a result of the wire form of the mobile networks as well as the presence of
possible innovations that are quite critical for 5G. The security challenges that are at the center
stage of 5G alongside the need for quick security measures are thus discussed at length (Hasnat
et al., 2019).
Research Questions
The following research questions should be addressed by the end of this research:
What is the 5G wireless communication system?
What are the benefits of 5G wireless communication systems?
What is the vulnerability of 5G wireless communication systems to security threats?
What are the security threats to 5G wireless communication systems?
What are the possible solutions to the security challenges of 5G wireless communication
systems?
Literature Review
Key Security Challenges in 5G
Critical infrastructure which will be connected with 5G will need security to make sure the safety
of not only critical infrastructure but the entire society. E.g. break of security in the online
provision of power channels can be catastrophic for all systems of electronic and electrical which
society relies on upon. It is very important to do the highlighting and investigation of the
importance of security issues in 5G networks as well as potential solutions which may result in
secure 5G systems (Maglaras et al., 2019).
Basic challenges in 5G
The traffic of flash network: End-user services as well as new things are so many.
Radio interface security: Encryption keys are sent over channels that are not secure.
Plane integrity user: User data plane has no cryptographic integrity to be safe.
Security mandated in the network: Optical use of security estimates rise from service
controlled constraints on the security architecture.
Security roaming: Security settlement with roaming results from user parameters that are
not upgraded with roaming from one operated network to the other.
What is the vulnerability of 5G wireless communication systems to security threats?
What are the security threats to 5G wireless communication systems?
What are the possible solutions to the security challenges of 5G wireless communication
systems?
Literature Review
Key Security Challenges in 5G
Critical infrastructure which will be connected with 5G will need security to make sure the safety
of not only critical infrastructure but the entire society. E.g. break of security in the online
provision of power channels can be catastrophic for all systems of electronic and electrical which
society relies on upon. It is very important to do the highlighting and investigation of the
importance of security issues in 5G networks as well as potential solutions which may result in
secure 5G systems (Maglaras et al., 2019).
Basic challenges in 5G
The traffic of flash network: End-user services as well as new things are so many.
Radio interface security: Encryption keys are sent over channels that are not secure.
Plane integrity user: User data plane has no cryptographic integrity to be safe.
Security mandated in the network: Optical use of security estimates rise from service
controlled constraints on the security architecture.
Security roaming: Security settlement with roaming results from user parameters that are
not upgraded with roaming from one operated network to the other.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Infrastructure of the denial of service attacks: Unencrypted directs channels while
elements are directed by nature of the network which is visible.
Storm signaling: Cooperation such as the third generation partnership project (3GPP)
rules of non-access stratum layer of the require a distribution control system
Denial of service attacks on end-user devices: Applications, putting into systems and
configuration data on users requires no security estimates.
Working group of the 3GPP such as SA WG3 is involved actively in the determination of
security architectures as well as protocols for 5G. Principles designed for 5G are outlined by
NGMN beyond radio efficiency are; creation of common compassable core alongside operations
and management which are simplified by adopting new computing as well as network
technologies.
Focus was on security of such technologies wthat fulfill NGMN design principles such as mobile
clouds, SDN and NFV alongside links of communication used by or among technologies
(Naslund et al., 2016).
Challenges of security are briefly described below
Mobile cloud security challenges: Computing systems are comprised by different resources that
users share, there is a possibility a user shares malicious information to bring down the whole
system, it also consumes greater resources or even stealthily fellow users’ resources. This
mobile cloud will migrate the concept of cloud computing in 5G ecosystems, which create
numerous of securities vulnerable which do rise with the architectural as well as infrastructural
modifications in 5G.
elements are directed by nature of the network which is visible.
Storm signaling: Cooperation such as the third generation partnership project (3GPP)
rules of non-access stratum layer of the require a distribution control system
Denial of service attacks on end-user devices: Applications, putting into systems and
configuration data on users requires no security estimates.
Working group of the 3GPP such as SA WG3 is involved actively in the determination of
security architectures as well as protocols for 5G. Principles designed for 5G are outlined by
NGMN beyond radio efficiency are; creation of common compassable core alongside operations
and management which are simplified by adopting new computing as well as network
technologies.
Focus was on security of such technologies wthat fulfill NGMN design principles such as mobile
clouds, SDN and NFV alongside links of communication used by or among technologies
(Naslund et al., 2016).
Challenges of security are briefly described below
Mobile cloud security challenges: Computing systems are comprised by different resources that
users share, there is a possibility a user shares malicious information to bring down the whole
system, it also consumes greater resources or even stealthily fellow users’ resources. This
mobile cloud will migrate the concept of cloud computing in 5G ecosystems, which create
numerous of securities vulnerable which do rise with the architectural as well as infrastructural
modifications in 5G.
MCC threats are categorized as per targeted cloud segments into front end, back end as well as
network-based mobile threats to security. The front end consists of mobile terminal on
applications as well as interfaces which are needed to gain access to facilities of cloud run, while
back end is composed of cloud servers, storage of systems of data, virtual machines, hypervisor
alongside protocols which are needed to provide cloud services. Network-based mobile security
threats are targeted in the direction of RATs which link mobile devices to cloud.
Challenges of security in NFV and SDN: The network control platform is centralized by the
SDN which intern enables programming in communication networks. However, these two
disruptive features generate chances for cracking as well as hacking network. The regulation
flow in the data path is modified by the SDN controller, hence it is very easy to identify
controller traffic (Nieto, 2018). The controller can also be challenged by the centered of the
network due to saturation effects.
NFV is very important for the networks for future communication that have security bottlenecks
like integrity, authenticity, confidential and non-repudiation. These NFV platforms do not give
serious security as well as isolation to services of virtualized telecommunication. The main
negative impacts here that require very fast attention in the entire network may be interfered with
suppose hypervisor is hijacked (Nieto, Acien and Fernandez, 2018).
Communication channels: The complexity of the ecosystem which involves drones and air
traffic control is from 5G systems thus, the need of the means to secure systems of
communication which can aid more frequent authentication as well as exchange of more
sensitive data. Before the introduction of 5G networks, communication channels pegged on GTP
as well as IPsec tunnels were dedicated by other mobile networks. 5G mobile networks of
network-based mobile threats to security. The front end consists of mobile terminal on
applications as well as interfaces which are needed to gain access to facilities of cloud run, while
back end is composed of cloud servers, storage of systems of data, virtual machines, hypervisor
alongside protocols which are needed to provide cloud services. Network-based mobile security
threats are targeted in the direction of RATs which link mobile devices to cloud.
Challenges of security in NFV and SDN: The network control platform is centralized by the
SDN which intern enables programming in communication networks. However, these two
disruptive features generate chances for cracking as well as hacking network. The regulation
flow in the data path is modified by the SDN controller, hence it is very easy to identify
controller traffic (Nieto, 2018). The controller can also be challenged by the centered of the
network due to saturation effects.
NFV is very important for the networks for future communication that have security bottlenecks
like integrity, authenticity, confidential and non-repudiation. These NFV platforms do not give
serious security as well as isolation to services of virtualized telecommunication. The main
negative impacts here that require very fast attention in the entire network may be interfered with
suppose hypervisor is hijacked (Nieto, Acien and Fernandez, 2018).
Communication channels: The complexity of the ecosystem which involves drones and air
traffic control is from 5G systems thus, the need of the means to secure systems of
communication which can aid more frequent authentication as well as exchange of more
sensitive data. Before the introduction of 5G networks, communication channels pegged on GTP
as well as IPsec tunnels were dedicated by other mobile networks. 5G mobile networks of
communication in SDV may be categorized into three communication channels that are, data
channel, control channel as well as inter-controller channel.
5G privacy: Major concerns according to the user can arise from data, location as well s
identity. Mentioning method and puporse of data storage is rarely done by the app developers. In
5G networks, the selection algorithms do leak location privacy. MNOs, providers of
communication service as well as network infrastructure providers are virtual actors of 5G
networks. But all these actors have different priorities for security and privacy. There are not in
place any physical boundaries of 5G networks as they used cloud-based storage of data as well as
NFV features (Palattella et al., 2016). Therefore, the operators do not have direct control of data
storing place in cloud environments.
Possible Solutions
The security results are highlighted for security challenges listed in preceding section. A solution
to this challenge of the traffic of flash network is by incorporation of new resources or raising
utility rate of existing systems with novel technologies. The challenges are can be solved in a
more cost-effective manner if new technologies for instance SDN as well as NFV are used
Network stats can be brought together by the controller SDN via southbound API from the tool
of the network to see if there are rises in the levels of traffic. Dedication of virtual slices of
network may be done only to areas having high density of UEs to tolerate flash network traffic
(Sriram et al., 2019).
Mobile clouds Security Solutions
Suggested security strategies in MCC goes through strategic use of virtualization technologies,
encryption techniques which are designed again and processing points of data dynamic
channel, control channel as well as inter-controller channel.
5G privacy: Major concerns according to the user can arise from data, location as well s
identity. Mentioning method and puporse of data storage is rarely done by the app developers. In
5G networks, the selection algorithms do leak location privacy. MNOs, providers of
communication service as well as network infrastructure providers are virtual actors of 5G
networks. But all these actors have different priorities for security and privacy. There are not in
place any physical boundaries of 5G networks as they used cloud-based storage of data as well as
NFV features (Palattella et al., 2016). Therefore, the operators do not have direct control of data
storing place in cloud environments.
Possible Solutions
The security results are highlighted for security challenges listed in preceding section. A solution
to this challenge of the traffic of flash network is by incorporation of new resources or raising
utility rate of existing systems with novel technologies. The challenges are can be solved in a
more cost-effective manner if new technologies for instance SDN as well as NFV are used
Network stats can be brought together by the controller SDN via southbound API from the tool
of the network to see if there are rises in the levels of traffic. Dedication of virtual slices of
network may be done only to areas having high density of UEs to tolerate flash network traffic
(Sriram et al., 2019).
Mobile clouds Security Solutions
Suggested security strategies in MCC goes through strategic use of virtualization technologies,
encryption techniques which are designed again and processing points of data dynamic
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
allocations. Hence, the securing of cloud services comes from the natural option of virtualization
since the connection of each end node to specific virtual instance in cloud via a virtual machine.
Securing of mobile terminals, the using of ant malware like improves the overall resistance
attacks. Securing framework in MCC will be made of mechanisms of energy efficient for
verification of data integrity as well as services storage which is joined with the possession
scheme for the public data which is profitable and storage outsourcing for prejudicial resilient for
the weight of the light. A cloud-based framework such as C-RAN for radio access network
security is proposed for optimizing and providing safer RANs for the 5G clouds (Tian et al.,
2019).
SDN and NFV solutions for their state security
SDN facilitates fast threat of identification via cycle of network resources harvesting
intelligence, states and flow are as a result of logically centered control plane with worldwide
network view and programming, therefore, most reactive and proactive securing controlling,
analysis of traffic and the system response for network forensics to be easier through the SDN
architecture supports. The architecture which has been suggested provides security to the real
entities of the telecommunication network, but also virtual use in a multi-tenant environment.
Communication channels security solutions in 5G system
Good channels of communication are required by the 5G networks not only for the maintenance
of additional positive impacts of SDN such as centered policy management, programming as
well as worldwide network state visibility but also for the prevention for the identified security
challenges (Vassilakis et al., 2017). The commonly used security procedure is IPsec, to help in
since the connection of each end node to specific virtual instance in cloud via a virtual machine.
Securing of mobile terminals, the using of ant malware like improves the overall resistance
attacks. Securing framework in MCC will be made of mechanisms of energy efficient for
verification of data integrity as well as services storage which is joined with the possession
scheme for the public data which is profitable and storage outsourcing for prejudicial resilient for
the weight of the light. A cloud-based framework such as C-RAN for radio access network
security is proposed for optimizing and providing safer RANs for the 5G clouds (Tian et al.,
2019).
SDN and NFV solutions for their state security
SDN facilitates fast threat of identification via cycle of network resources harvesting
intelligence, states and flow are as a result of logically centered control plane with worldwide
network view and programming, therefore, most reactive and proactive securing controlling,
analysis of traffic and the system response for network forensics to be easier through the SDN
architecture supports. The architecture which has been suggested provides security to the real
entities of the telecommunication network, but also virtual use in a multi-tenant environment.
Communication channels security solutions in 5G system
Good channels of communication are required by the 5G networks not only for the maintenance
of additional positive impacts of SDN such as centered policy management, programming as
well as worldwide network state visibility but also for the prevention for the identified security
challenges (Vassilakis et al., 2017). The commonly used security procedure is IPsec, to help in
securing communication channels which avoids telecommunication. The results are not
recommended for critical infrastructure communication.
5G privacy solutions in the system
The availability built-in must be from many necessary features where 5G embody privacy by
approaches of design is taken into consideration from beginning in system. In public clouds, in
which low data is where mobile operators are can store as well as process high sensitive locally
alongside less sensitive data, a high bread based cloud approach is required.
Control access, approachability, transparency, minimization of data and being accountable are
some of the better mechanisms required by 5G. Regulation approaches are grouped into three
types i.e. in government level of regulation it must be first, where country-specific privacy
regulation made by the government mainly and through multinational organizations such UN etc.
Anonymity based techniques of location privacy has to be applied to real identity of the
subscriber that can be hidden as well as replaced with pseudonyms (Vassilakis et al., 2017).
Research Methodology
Research methodology revolves around the voluntary approach that helps the researcher to
gather the data needed for the purposes of meeting the aims and objectives of the research. In this
phase of research, data that is most relevant and of significance to the research question are
collected for use in the analysis that is carried out at later stages. The main aim of this study is to
evaluate the issues revolving around the securing of the Internet of Things in the 5G era. The
objectives and aims of the research will be established to help in attaining the main aim of the
study. The objective and aims can be derived from the research questions that are already listed.
Gaining an elaborate and comprehensive understanding of the research topic calls for carrying
recommended for critical infrastructure communication.
5G privacy solutions in the system
The availability built-in must be from many necessary features where 5G embody privacy by
approaches of design is taken into consideration from beginning in system. In public clouds, in
which low data is where mobile operators are can store as well as process high sensitive locally
alongside less sensitive data, a high bread based cloud approach is required.
Control access, approachability, transparency, minimization of data and being accountable are
some of the better mechanisms required by 5G. Regulation approaches are grouped into three
types i.e. in government level of regulation it must be first, where country-specific privacy
regulation made by the government mainly and through multinational organizations such UN etc.
Anonymity based techniques of location privacy has to be applied to real identity of the
subscriber that can be hidden as well as replaced with pseudonyms (Vassilakis et al., 2017).
Research Methodology
Research methodology revolves around the voluntary approach that helps the researcher to
gather the data needed for the purposes of meeting the aims and objectives of the research. In this
phase of research, data that is most relevant and of significance to the research question are
collected for use in the analysis that is carried out at later stages. The main aim of this study is to
evaluate the issues revolving around the securing of the Internet of Things in the 5G era. The
objectives and aims of the research will be established to help in attaining the main aim of the
study. The objective and aims can be derived from the research questions that are already listed.
Gaining an elaborate and comprehensive understanding of the research topic calls for carrying
out a review on the existing literature on the security challenges to wireless communication
systems in the era of 5G
There is need to be familiar with the various dimensions of the research topic and thus calling for
carrying out qualitative data analysis alongside the literature survey within the period of the
study. The selected research approach tends to be appropriate in carrying out the study since the
literature review to be carried out will serve to provide in-depth data in finding out and
documenting a range of variations in the security challenges to wireless communication systems
in the era of 5G.
The selected research methodology provides a summary of the investigations that have been
carried out on the topic the security challenges to wireless communication systems in the era of
5G. Through the literature review, the researcher is able to get a better understanding of the topic
and develop possible solutions to the research questions besides aiding in the identification of the
research gap (Vassilakis et al., 2017).
Two types of data will be collected in this study: primary and secondary data. Primary data will
be collected from the various stakeholders in the sector of wireless communication and
computing in which they will be engaged in a discussion regarding the research topic to get their
views following their experiences. Primary data collection will be done using questionnaires and
interviews. A wide range of questions will be typed including closed and open-ended questions
and then administered to the selected research study sample population. The responses will be
gathered and a comparison made where necessary.
For the case of interviews, individual and group interviews will be conducted with the aim of
collecting information on security challenges to wireless communication systems in the era of
systems in the era of 5G
There is need to be familiar with the various dimensions of the research topic and thus calling for
carrying out qualitative data analysis alongside the literature survey within the period of the
study. The selected research approach tends to be appropriate in carrying out the study since the
literature review to be carried out will serve to provide in-depth data in finding out and
documenting a range of variations in the security challenges to wireless communication systems
in the era of 5G.
The selected research methodology provides a summary of the investigations that have been
carried out on the topic the security challenges to wireless communication systems in the era of
5G. Through the literature review, the researcher is able to get a better understanding of the topic
and develop possible solutions to the research questions besides aiding in the identification of the
research gap (Vassilakis et al., 2017).
Two types of data will be collected in this study: primary and secondary data. Primary data will
be collected from the various stakeholders in the sector of wireless communication and
computing in which they will be engaged in a discussion regarding the research topic to get their
views following their experiences. Primary data collection will be done using questionnaires and
interviews. A wide range of questions will be typed including closed and open-ended questions
and then administered to the selected research study sample population. The responses will be
gathered and a comparison made where necessary.
For the case of interviews, individual and group interviews will be conducted with the aim of
collecting information on security challenges to wireless communication systems in the era of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5G. The group interviews will involve participants who belong to the same rank within an
institution or organization. Through the group interview, the researcher will be able to gather
information on the security challenges to wireless communication systems in the era of 5G from
the perspective of the interviewees. Group interviews will as well offer platforms for making
amendments on information that might not be accurate as corrected of a member by another
member. Group interviews provide a platform for freely sharing views and thoughts on a specific
topic. Individual interviews will, on the other hand, be conducted for higher management within
organizations deemed to be likely having information regarding the security challenges to
wireless communication systems in the era of 5G. Prior arrangements will be made and the
interviews carried out only when it is most convenient.
Secondary data, on the other hand, would mainly be derived from the works by previous experts
in the same field. This will form the main source of information for this research. The sources
will be inclusive of peer-reviewed articles and journals as well as books whose reliability and
authenticity are verifiable. 100 sources will be collected from various libraries and then sorted in
terms of relevancy and age. Sources published less than 5 years ago would be most preferred as
the information contained therein conforms to the current trend hence have higher accuracy.
Problems and Limitations
Lack of previous research on study topic: Technology and innovation is fast changing and the
rate of changes take place so fast that gathering information on the topic has not been easily
attained. This research mainly depends on literature reviews as the main information source as it
aids in the identification of the scope of the study of the work that has been documented in the
area of research to this extent. The findings from the literature review are to be used for the
institution or organization. Through the group interview, the researcher will be able to gather
information on the security challenges to wireless communication systems in the era of 5G from
the perspective of the interviewees. Group interviews will as well offer platforms for making
amendments on information that might not be accurate as corrected of a member by another
member. Group interviews provide a platform for freely sharing views and thoughts on a specific
topic. Individual interviews will, on the other hand, be conducted for higher management within
organizations deemed to be likely having information regarding the security challenges to
wireless communication systems in the era of 5G. Prior arrangements will be made and the
interviews carried out only when it is most convenient.
Secondary data, on the other hand, would mainly be derived from the works by previous experts
in the same field. This will form the main source of information for this research. The sources
will be inclusive of peer-reviewed articles and journals as well as books whose reliability and
authenticity are verifiable. 100 sources will be collected from various libraries and then sorted in
terms of relevancy and age. Sources published less than 5 years ago would be most preferred as
the information contained therein conforms to the current trend hence have higher accuracy.
Problems and Limitations
Lack of previous research on study topic: Technology and innovation is fast changing and the
rate of changes take place so fast that gathering information on the topic has not been easily
attained. This research mainly depends on literature reviews as the main information source as it
aids in the identification of the scope of the study of the work that has been documented in the
area of research to this extent. The findings from the literature review are to be used for the
establishment of the foundation of this research through which the research objectives are
attained.
However, 5G being a new innovation that is not spread even to the most of the countries, there is
little information available in the published works regarding the most contemporary as well as
evolving problem or research. The available literature related to the research topic is mainly
discussing the previous wireless communication systems including 1G, 2G, 3G, and 4G which
might not be a real reflection of the current 5G network. The sources that have managed their
way into the peer-reviewed database do not contain enough information that can be used in
grounding the study. This leaves the researcher with information that is more of scanty and
disjointed
Scope of the study: Meeting the needs of this research requires elaborate and extensive expertise
owing to the bulk of the task and level of detail that will be needed for a final refined copy of the
work. The depth of the discussions, as well as the scope of the research, is thus likely to be
compromised in numerous levels in comparison against the works as presented by more
experienced scholars.
attained.
However, 5G being a new innovation that is not spread even to the most of the countries, there is
little information available in the published works regarding the most contemporary as well as
evolving problem or research. The available literature related to the research topic is mainly
discussing the previous wireless communication systems including 1G, 2G, 3G, and 4G which
might not be a real reflection of the current 5G network. The sources that have managed their
way into the peer-reviewed database do not contain enough information that can be used in
grounding the study. This leaves the researcher with information that is more of scanty and
disjointed
Scope of the study: Meeting the needs of this research requires elaborate and extensive expertise
owing to the bulk of the task and level of detail that will be needed for a final refined copy of the
work. The depth of the discussions, as well as the scope of the research, is thus likely to be
compromised in numerous levels in comparison against the works as presented by more
experienced scholars.
References
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. and Gurtov, A., 2017,
September. 5G security: Analysis of threats and solutions. In 2017 IEEE Conference on
Standards for Communications and Networking (CSCN) (pp. 193-199). IEEE
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. and Gurtov, A., 2018. Overview
of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1),
pp.36-43
Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Félix, E., Klaedtke, F., Nakarmi,
P.K., Näslund, M., O’Hanlon, P. and Papay, J., 2018. A security architecture for 5G
networks. IEEE Access, 6, pp.22466-22479
Hasnat, M.A., Rurnee, S.T.A., Razzaque, M.A. and Mamun-Or-Rashid, M., 2019, February.
Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future
Direction. In 2019 International Conference on Electrical, Computer and Communication
Engineering (ECCE)(pp. 1-4). IEEE
Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. and Rallis, S., 2019. Threats,
Protection and Attribution of Cyber Attacks on Critical Infrastructures. arXiv preprint
arXiv:1901.03899
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. and Gurtov, A., 2017,
September. 5G security: Analysis of threats and solutions. In 2017 IEEE Conference on
Standards for Communications and Networking (CSCN) (pp. 193-199). IEEE
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M. and Gurtov, A., 2018. Overview
of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1),
pp.36-43
Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Félix, E., Klaedtke, F., Nakarmi,
P.K., Näslund, M., O’Hanlon, P. and Papay, J., 2018. A security architecture for 5G
networks. IEEE Access, 6, pp.22466-22479
Hasnat, M.A., Rurnee, S.T.A., Razzaque, M.A. and Mamun-Or-Rashid, M., 2019, February.
Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future
Direction. In 2019 International Conference on Electrical, Computer and Communication
Engineering (ECCE)(pp. 1-4). IEEE
Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. and Rallis, S., 2019. Threats,
Protection and Attribution of Cyber Attacks on Critical Infrastructures. arXiv preprint
arXiv:1901.03899
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Naslund, M., Phillips, S., Surridge, M., Moraru, M., Heikkinen, S., Pernilla, T., Arfaoui, G.,
Sanchez Vilchez, J.M., Wary, J.P., O'Hanlon, P. and Valero, A.J., 2016. 5G-ENSURE-D2. 3
Risk Assessment, Mitigation and Requirements (draft)
Nieto, A., 2018, July. An Overview of Proactive Forensic Solutions and its Applicability to 5G.
In 2018 IEEE 5G World Forum (5GWF) (pp. 191-196). IEEE
Nieto, A., Acien, A. and Fernandez, G., 2018. Crowdsourcing analysis in 5g iot: Cybersecurity
threats and mitigation. Mobile Networks and Applications, pp.1-9
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016.
Internet of things in the 5G era: Enablers, architecture, and business models. IEEE Journal on
Selected Areas in Communications, 34(3), pp.510-527
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016.
Internet of Things in the 5G Era: Enabling Technologies and Business Models. IEEE Journal on
Selected Areas in Communications, 34(3), pp.1-9
Sriram, P.P., Wang, H.C., Jami, H.G. and Srinivasan, K., 2019. 5G Security: Concepts and
Challenges. In 5G Enabled Secure Wireless Networks (pp. 1-43). Springer, Cham
Tian, Z., Su, S., Li, M., Du, X. and Guizani, M., 2019. Automated Attack and Defense
Framework for 5G Security on Physical and Logical Layers. arXiv preprint arXiv:1902.04009
Vassilakis, V.G., Mouratidis, H., Panaousis, E., Moscholios, I.D. and Logothetis, M.D., 2017,
May. Security requirements modelling for virtualized 5G small cell networks. In 2017 24th
International Conference on Telecommunications (ICT) (pp. 1-5). IEEE
Sanchez Vilchez, J.M., Wary, J.P., O'Hanlon, P. and Valero, A.J., 2016. 5G-ENSURE-D2. 3
Risk Assessment, Mitigation and Requirements (draft)
Nieto, A., 2018, July. An Overview of Proactive Forensic Solutions and its Applicability to 5G.
In 2018 IEEE 5G World Forum (5GWF) (pp. 191-196). IEEE
Nieto, A., Acien, A. and Fernandez, G., 2018. Crowdsourcing analysis in 5g iot: Cybersecurity
threats and mitigation. Mobile Networks and Applications, pp.1-9
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016.
Internet of things in the 5G era: Enablers, architecture, and business models. IEEE Journal on
Selected Areas in Communications, 34(3), pp.510-527
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016.
Internet of Things in the 5G Era: Enabling Technologies and Business Models. IEEE Journal on
Selected Areas in Communications, 34(3), pp.1-9
Sriram, P.P., Wang, H.C., Jami, H.G. and Srinivasan, K., 2019. 5G Security: Concepts and
Challenges. In 5G Enabled Secure Wireless Networks (pp. 1-43). Springer, Cham
Tian, Z., Su, S., Li, M., Du, X. and Guizani, M., 2019. Automated Attack and Defense
Framework for 5G Security on Physical and Logical Layers. arXiv preprint arXiv:1902.04009
Vassilakis, V.G., Mouratidis, H., Panaousis, E., Moscholios, I.D. and Logothetis, M.D., 2017,
May. Security requirements modelling for virtualized 5G small cell networks. In 2017 24th
International Conference on Telecommunications (ICT) (pp. 1-5). IEEE
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.