Security Challenges, Threat and Solutions for 5G Network for IoT
Main Article Content
Abstract
5G mobile broadband infrastructure creates various safety concerns. We must compare 5G Mobile Wi-Fi Networking to older mobile networks (4G). We'll start with 5G broadcaster characteristics, then 5G cellular security. We'll look at risks and security. The latest advancements in 5G mobile network security must be discussed, including device identification, network accessibility, data encryption, protection, and intrusion prevention. The 5G Mobile Wireless Network incorporates new security measures due to IoT, mMIMO, device-to-device communications, and software defined networks (SDN). Such innovations and research characterize 5G Mobile Wireless Security. Currently, new penetration detection technologies are necessary. A brief summary of 5G safety management is provided. For example, the Internet of Things (IoT) may leverage breakthrough technology concepts to provide great digital services internationally. SDN and NFV are common solutions that use cloud technologies like Smartphone Cloud Computing. Protectingfuture mobile communications advances and customers is important. Also discussed are SDN and NFV as well as consumer security. Concerns about 5G network security will be addressed in this study. 5G will provide pervasive network service, improved customermobility, and low-cost device connection (e.g., IoT). Information technology, SDN, and NFV are crucial 5G accelerators. Aside from privacy problems, these innovations represent major safety dangers. This article also addresses 5G's data security challenges. We also discuss current and future 5G safety alternatives.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Pakistan Journal Emerging Science and Technologies (PJEST) in collaboration with Govt. Islamia Graduate College Civil Lines Lahore, Pakistan is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
M. Agiwal, A. Roy, and N. Saxena, “Next Generation 5G Wireless Networks: A Comprehensive Survey,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 1617–1655, thirdquarter 2016.
N. Alliance, “NGMN 5G white paper,” Next Generation Mobile Networks, White paper, 2015.
3GPP. (2017, May) SA3-Security. The Third Generation Partnership Project (3GPP). [Online]. Available: http://www.3gpp.org/Specifications-groups/sa- plenary/54-sa3-security
ONF. (2013) SDN Security Considerations in the Data Center. Open Networking Foundation. [Online]. Available: https://www.opennetworking.org/sdn-esources/sdn-library
P. Kulkarni, R. Khanai, and G. Bindagi, “Security frameworks for mobile cloud computing: A survey,” in 2016 International Conference. Electrical, Electronics, and Optimization Techniques (ICEEOT), March 2016, pp. 2507–2511
S. S. Vikas, K. Pawan, A. K. Gurudatt, and G. Shyam, “Mobile cloud computing: Security threats,” in 2014 International Conference on Electronics and Communication Systems (ICECS), Feb 2014, pp. 1– 4.
M. L. Polla, F. Martinelli, and D. Sgandurra, “A Survey on Security for Mobile Devices,” IEEE Communications Surveys Tutorials, vol. 15, no. 1, pp. 446–471, First 2013.
H. Suo, Z. Liu, J. Wan, and K. Zhou, “Security and privacy in mobile cloud computing,” in 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), July 2013, pp. 655– 659.
A. Chonka and J. Abawajy, “Detecting and Mitigating HX-DoS Attacks against Cloud Web Services,” in 2012 15th International Conference on Network-Based Information Systems, Sept 2012, pp. 429–434.
V. Sucasas, G. Mantas, and J. Rodriguez, “Security Challenges for Cloud Radio Access Networks,” Backhauling/Fronthauling for Future Wireless Systems, pp. 195–211, 2016.
I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 4, pp. 2317–2346, Fourthquarter 2015.
S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-defined Networks,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13. New York, NY, USA: ACM, 2013, pp. 413–424. [Online]. Available:http://doi.acm.org/10.1145/2508859.2516684
P. Fonseca, R. Bennesby, E. Mota, and A. Passito, “A replication component for resilient OpenFlow-based networking,” in 2012 IEEE Network Operations and Management Symposium, April 2012, pp. 933– 939.
D. Kreutz, F. M. Ramos, and P. Verissimo, “Towards Secure and Dependable Software-defined Networks,” in proceeding of the second ACM SIGCOMM workshop on Hot Topics in Software Defined Networking, ser. HotSDN ’13. New York, NY, USA: ACM, 2013, pp. 55–60. [Online]. Available: http://doi.acm.org/10.1145/2491185.2491199
A. van Cleeff, W. Pieters, and R. J. Wieringa, “Security Implications of Virtualization: A Literature Study,” in 2009 International Conference on Computational Science and Engineering, vol. 3, Aug 2009, pp. 353–358.
S. J. Vaughan-Nichols, “Virtualization sparks security concerns,” Computer, vol. 41, no. 8, pp. 13–15, Aug 2008.
M. Monshizadeh, V. Khatri, and A. Gurtov, “NFV security considerations for cloud-based mobile virtual network operators,” in 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Sept 2016, pp. 1–5.
H. Hawilo, A. Shami, M. Mirahmadi, and R. Asal, “NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC),” IEEE Network, vol. 28, no. 6, pp. 18–26, Nov 2014.
W. Yang and C. Fung, “A survey on security in network functions virtualization,” in 2016 IEEE NetSoft Conference and Workshops (NetSoft), June 2016, pp. 15– 19.
M. Liyanage, A. Gurtov, and M. Ylianttila, Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture. John Wiley & Sons, 2015.
M. Liyanage, A. B. Abro, M. Ylianttila, and A. Gurtov, “Opportunities and Challenges of Software-DefinedMobile Networks in Network Security,” IEEE Security Privacy, vol. 14, no. 4, pp. 34–44, July 2016.
M. Liyanage, M. Ylianttila, and A. Gurtov, “Securing the control channel of software-defined mobile networks,” in Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, June 2014, pp. 1–6.
S. Shin and G. Gu, “Attacking software-defined networks: A first feasibility study,” in proceeding of the second ACM SIGCOMM Workshop in hot Topics is software Defined Networking, ser. HotSDN ’13. New York, NY, USA: ACM, 2013, pp. 165–166. [Online].Available: http://doi.acm.org/10.1145/2491185.2491220
M. Liyanage, A. Braeken, A. D. Jurcut, M. Ylianttila, andA. Gurtov, “Secure communication channel architecture for Software Defined Mobile Networks,” Computer Networks, vol. 114, pp. 32 – 50, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S138912 8617300075
T. Kumar and M. Liyanage and A. Braeken and I. Ahmad and M. Ylianttila, “From Gadget to Gadget-Free Hyperconnected World: Conceptual Analysis of User Privacy Challenges,” in 2017 European Conference on Networks and Communications (EuCNC), June 2017, pp. 1–6.