Abstract

The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. We categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers, the physical layer between the base stations and users’ device presents increased opportunities for attacks such as eavesdropping and data fabrication. However, no single OSI layer can stand on its own to provide proper security. All layers in the 5G must work together, providing their own unique technology in an effort to ensure security and integrity for 5G data.

Highlights

  • While some still see 5G in the idea phase [1], wireless service providers such as Verizon began taking orders for their 5G Home product on October 1, 2018 in Houston, Indianapolis, Los Angeles and Sacramento [2]. 5G networking enables a major number of use cases compared to previous generations

  • In order to avoid the limitation given by a crowded spectrum, a shift toward Millimeter Wave transmissions with carrier frequencies above 6 Ghz has been proposed, and significant research contributions have been devoted to its implementation [7]

  • CONTRIBUTIONS In our paper we focus on 5G security and, we summarize the vulnerabilities and threats, security solutions and challenges, gaps and open research issues organized by Open Systems Interconnection (OSI) layers

Read more

Summary

INTRODUCTION

While some still see 5G in the idea phase [1], wireless service providers such as Verizon began taking orders for their 5G Home product on October 1, 2018 in Houston, Indianapolis, Los Angeles and Sacramento [2]. 5G networking enables a major number of use cases compared to previous generations. Software Defined Network (SDN) and Network Function Virtualization (NFV) are expected to provide the programmability lacking in previous cellular generations by replacing dedicated network components with programmable ones able to accommodate multiple network requirements [9]. To protect the privacy and integrity of data traversing 5G networks, multiple layers of security using diverse technologies are required [11]–[13]. Heterogeneous Network (HetNet), MIMO and mmWave are among the emerging technologies that can be exploited for security purposes [16], [17] Due to their recent development and success, bitcoin and cryptocurrency in general, can be deemed as an important component of the 5G environment. In TCP/IP instead, application, presentation and session layers are comprised in the application layer, while the network interface layer takes on the functionalities of the data link and physical layers of the seven-layered OSI approach. We provide a comparison with other available surveys on the topic to show how our OSI-oriented approach allows for a better investigation of 5G security and privacy

COMPARISON WITH OTHER SURVEYS
SECURITY THREATS EVOLUTION
PRESENTATION LAYER
SESSION LAYER
TRANSPORT LAYER
VULNERABILITIES AND THREATS
PHYSICAL LAYER
Public Key Cryptography*
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.