Abstract

The convergence of the Internet of Things (IoT) and 5G will open a range of opportunities for the deployment of enhanced sensing, actuating and interactive systems as well as the development of novel services and applications in a plethora of fields. Given the processing and communication limitations of both IoT devices and the most novel IoT transmission technologies, namely, Low Power Wide Area Network (LPWAN), there are notable concerns regarding certain security issues to be overcome in order to achieve a successful integration of LPWAN systems within 5G architectures. In this survey work, we analyze the main security characteristics of LPWANs, specially focusing on network access, and contrast them with 5G security requirements and procedures. Besides, we present a comprehensive review and analysis of research works proposing security solutions for the 5G-LPWAN integration. Finally, we explore open issues and challenges in the field and draw future research directions. From our analysis, it is evident that many efforts are being devoted from the academia, industry and Standards Developing Organizations (SDOs) for achieving the desired confluence of IoT and 5G worlds. We envision a successful integration of both ecosystems by exploiting novel lightweight security schemes addressing the stringent security requirements of 5G while being assumable by constrained IoT devices.

Highlights

  • The Internet of Things (IoT) has revolutionized our lives as it has paved the way for a plethora of applications and services never imagined few time ago

  • The great interest in the convergence of IoT and 5G ecosystems has fueled the development of standards, industrial solutions and research proposals for solving the security issues that this complex integration brings

  • This paper has deeply reviewed the security procedures of the 5G architecture, as defined by the 3rd Generation Partnership Project (3GPP) standard, and explored the security strengths and weaknesses of widely adopted Low Power Wide Area Network (LPWAN)-based technologies such as LoRaWAN, Sigfox, or NB-IoT

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) has revolutionized our lives as it has paved the way for a plethora of applications and services never imagined few time ago. The change_cipher_spec signals the other end-point a success in the algorithm negotiation, indicating that the chosen algorithm will be employed during the rest of the handshake When receiving this message, the AUSF verifies the UE’s certificate, the Home Network considering the UE as authenticated. Some of its main security requirements include support of efficient authentication means for a wide range of IoT devices, and the use of a suitable authentication framework, namely EAP, to allow alternative authentication mechanisms to those standardised by 3GPP, e.g., 5G-AKA These mechanisms may employ different types of credentials defined by standardisation bodies outside of the 3GPP when accessing non-public networks [41].

CLASSIFICATION ASPECTS
LORAWAN
OPEN ISSUES AND CHALLENGES
INTEROPERABILITY
RESEARCH DIRECTIONS
CONCLUSION
VIII. ACKNOWLEDGMENTS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call