Abstract

Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless technologies. An alternative network, Y-Communication (Y-Comm), proposes to integrate the current wired and wireless networks, attempting to achieve the main service requirements of 5G by converging the existing networks and providing an improved service anywhere at any time. Quality of service (QoS), vertical handover, and security are some of the technical concerns resulting from this heterogeneity. In addition, it is believed that the Y-Comm convergence will have a greater influence on security than was the case with the previous long-term evolution (LTE) 4G networks and with future 5G networks. The purpose of this research is to satisfy the security recommendations for 5G mobile networks. This research provides a policy-based security management system, ensuring that end-user devices cannot be used as weapons or tools of attack, for example, IP spoofing and man-in-the-middle (MITM) attacks. The results are promising, with a low disconnection rate of less than 4% and 7%. This shows the system to be robust and reliable.

Highlights

  • (i) Provide features such as high mobility (ii) Be ultrareliable and have ultralow latency (1 ms) (iii) Have a high peak data rate of 10–20 GB

  • According to a press release issued by the group, this is in part because “security goals are underspecified” and there is a “lack of precision” [8]. erefore, the security specifications of 5G heterogeneous networks can be classified into two levels; the first is associated with mobile equipment and the second with operator networks

  • We specified policies in this security management system based on these recommendations. erefore, we focus on the International Telecommunication Union (ITU) Telecommunication Standardisation Sector (ITU-T) recommendation M.3400

Read more

Summary

Introduction

(i) Provide features such as high mobility (ii) Be ultrareliable and have ultralow latency (1 ms) (iii) Have a high peak data rate of 10–20 GB. Park et al discovered that because 5G is an IP-based and heterogeneous network, a variety of security threats exist that have the potential to interrupt service and allow data to be expropriated They investigated and suggested solutions for a number of ongoing open problems that need to be solved [4]. Y-Comm and Hockey have proposed some security solutions for heterogeneous mobile networks These solutions do not consider the security of end-user devices, which are the source of numerous security weaknesses, and do not meet the security standards of 5G systems. Is situation can worsen when the attacker takes full control of the end-user device, generating a need for a solution incorporated into network security systems. An attacker who steals a user’s identity may attempt other attacks using this identity

Related Work
Framework Overview
Results
Testing Performance
Conclusion and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.