logo

Securing Internet of Things in 5G Era

   

Added on  2023-03-30

15 Pages3400 Words363 Views
SECURING INTERNET OF THINGS IN 5G ERA
By Name
Course
Instructor
Institution
Location
Date

Background
5G wireless network vision revolves around the provision of very high rates of data as well as
better coverage via dense deployment of base station with enhanced capacity, relatively better
Quality of Service as well as lowest latency attainable. Proper networking, storage, deployment
of service, processing as well as storage methods are needed to attain the necessary services as
envisioned by 5G. Cloud computing offers one of the most efficient ways for maintaining data,
applications as well as services for the operators without necessarily having to win the
infrastructure for such roles (Ahmad et al., 2017). Hence, mobile clouds that adopt the very
concept is likely to come along with systems that are technologically distinct into one domain
where numerous services may be deployed to attain enhanced levels of flexibility as well as
availability with as low Capital of Expenditure as well as Operational Expenses as possible.
Higher flexibility, as well as easier portability, will be enabled of the systems and services of the
network through softwarizing the functions of network. Software Defined Network allows the
softwarizing of a network functions through the separation of network control plane from data
forwarding planes. Software Defined Network invokes innovation in networking via abstraction
as well as simplification of the management of network (Ahmad et al., 2018). Network Function
Virtualization offers the platform for placement of different network functions in various
perimeters of the network on the basis of need and removes the service or function specific
hardware need. Software Defined Network and Network Function, working in conjunction,
enhance the elasticity of network, results in simplification of the management and control of a
network, eliminates the vendor-specific prosperity options barriers hence perceived to be of great
importance for future networks.

Problem Statement
Wireless communication systems have been subjected to numerous security vulnerabilities since
time they were established. Wireless channels, as well as mobile phones, were in the first
generation a target for masquerading and illegal cloning. Message spamming was a common
phenomenon in the second generation for both pervasive attacks as well as injection of untrue
information or even broadcasting information that is unwanted in the market. The 3G generation
networks were as well not spared (Arfaoui et al., 2018). This generation was accompanied by IP
communication that allowed relocation of vulnerabilities of internet security as well as
challenges noted in the wireless domains.
The 4G mobile networks, with enhanced need for IP based communication, allowed the entry of
smart devices, new services as well as multimedia traffic into the domain of the mobile industry.
Such a development resulted in a more sophisticated as well as dynamic landscape of threat.
With the arrival of 5G wireless networks, it is anticipated that the vectors of security that be
increased in size than the ones that existed prior with enhanced concern for privacy issues. It is
this of importance to highlight the likely challenges with regard to the security of 5G networks
which threaten as a result of the wire form of the mobile networks as well as the presence of
possible innovations that are quite critical for 5G. The security challenges that are at the center
stage of 5G alongside the need for quick security measures are thus discussed at length (Hasnat
et al., 2019).
Research Questions
The following research questions should be addressed by the end of this research:
What is the 5G wireless communication system?

What are the benefits of 5G wireless communication systems?
What is the vulnerability of 5G wireless communication systems to security threats?
What are the security threats to 5G wireless communication systems?
What are the possible solutions to the security challenges of 5G wireless communication
systems?
Literature Review
Key Security Challenges in 5G
Critical infrastructure which will be connected with 5G will need security to make sure the safety
of not only critical infrastructure but the entire society. E.g. break of security in the online
provision of power channels can be catastrophic for all systems of electronic and electrical which
society relies on upon. It is very important to do the highlighting and investigation of the
importance of security issues in 5G networks as well as potential solutions which may result in
secure 5G systems (Maglaras et al., 2019).
Basic challenges in 5G
The traffic of flash network: End-user services as well as new things are so many.
Radio interface security: Encryption keys are sent over channels that are not secure.
Plane integrity user: User data plane has no cryptographic integrity to be safe.
Security mandated in the network: Optical use of security estimates rise from service
controlled constraints on the security architecture.
Security roaming: Security settlement with roaming results from user parameters that are
not upgraded with roaming from one operated network to the other.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of things - Assignment
|13
|4549
|42

A Risk Management framework for 5G
|11
|2652
|70

Impact of 5G on Profitability and Customer Services of Dell
|15
|5114
|56

Wireless Security for Rare Vintage Auto Parts Ltd
|19
|5679
|416

Implementation of Cloud Computing in VideoDev
|32
|2579
|320

Internet of Things: Security and Privacy Issues in Cloud and Fog Domain
|8
|1892
|23