Examining IoT Applications in the Perspective of Security Technologies in 5G Networks

Yaşar Serdar Fidaner

Nuh Naci Yazgan University

https://orcid.org/0009-0003-4903-2644

Asuman Savaşçıhabeş

Nuh Naci Yazgan University

https://orcid.org/0000-0002-7261-1906

DOI: https://doi.org/10.56038/oprd.v5i1.599

Keywords: 5G, network, privacy, security architecture, network slicing, End to End security


Abstract

While 5G technology revolutionizes the communication infrastructure as the driving force of digital transformation, it also brings security threats. Offering the advantages of high-speed data transmission and low latency, this technology has created new attack surfaces for malicious actors with complex waveforms and wide-band communication channels. Increasing device connections and network complexity reveal the need for stronger security solutions against cyberattacks that threaten the privacy of individuals and institutions. Overall, 5G is also leading to advances in various sectors by improving connectivity and performance. The 5G security architecture offers a variety of advanced concepts and techniques to address the unique challenges posed by this technology. This study examines the basic concepts and protection techniques that are integral to 5G security, as well as the security framework of the technology that addresses the increasing complexity and scale of modern networks and provides a secure and resilient communication environment.


References

Mechanisms," 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2023, pp. 1-4,2023.

T. Sachdeva, S. Kumar, M. Diwakar, P. Singh, N. K. Pandey and S. Choudhary, "Comparative Analysis of 5G Security

M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, M. Ylianttila, “A Comprehensive Guide to 5G Security”, Wiley, 2018. DOI: https://doi.org/10.1002/9781119293071

N. Ben Henda, "Overview on the Security in 5G Phase 2," in Journal of ICT Standardization, vol. 8, no. 1, pp. 1-14, 2020.

J. Cao et al., "A Survey on Security Aspects for 3GPP 5G Networks," in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 170-195, 2020.

S. Qin and C. Lao, "Computer Network Security Defense System in 5G Era," 2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs), Nicosia, Cyprus, pp. 169-174, 2022. DOI: https://doi.org/10.1109/AIoTCs58181.2022.00032

J. Lee, H. Kim, C. Park, Y. Kim and J. -G. Park, "AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments," 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, Republic of, pp. 971-975, 2022. DOI: https://doi.org/10.1109/ICTC55196.2022.9952490

M. Pejanović-Djurišić and S. Kuklinski, "5G Security Landscape: Concept and Remaining Challenges," 2022 30th Telecommunications Forum (TELFOR), Belgrade, Serbia, pp. 1-4, 2022.

S. Xia et al., "Research on the Physical Layer Security for Industrial 5G Private Networks," 2023 IEEE 11th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, pp. 816-819, 2023.

W. You, M. Xu and D. Zhou, "Research on security protection technology for 5G cloud network," 2021 International Conference on Advanced Computing and Endogenous Security, Nanjing, China, pp. 01-11, 2022. DOI: https://doi.org/10.1109/IEEECONF52377.2022.10013352

M. Pejanović-Djurišić and S. Kuklinski, "Enabling end-to-end security of networks with 5G segment," 2023 31st Telecommunications Forum (TELFOR), Belgrade, Serbia, pp. 1-4, 2023. DOI: https://doi.org/10.1109/TELFOR59449.2023.10372743

X. Zhang, J. Fei, H. Jiang and X. Huang, "Research on Power 5G Business Security Architecture and Protection Technologies," 2021 6th International Conference on Power and Renewable Energy (ICPRE), Shanghai, China, pp. 913-917, 2021. DOI: https://doi.org/10.1109/ICPRE52634.2021.9635437

Z. Zou, T. Chen, J. Chen, Y. Hou and R. Yang, "Research on Network Security Risk and Security Countermeasures of 5G Technology in Power System Application," 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, pp. 102-105, 2021. DOI: https://doi.org/10.1109/IAEAC50856.2021.9390826

Ashton, K. (2009), "That 'Internet of Things' Thing"

Khan et al. (2021), "5G and IoT: A New Era of Connectivity"

Liu, Y. et al. (2020), "A Survey of DDoS Attacks in IoT and 5G Networks"

J. Cao, et al., "A Survey on Security Aspects for 3GPP 5G Networks," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 170- 195, 2020 DOI: https://doi.org/10.1109/COMST.2019.2951818

S. Xia, et al., "Research on the Physical Layer Security for Industrial 5G Private Networks," 2023 IEEE 11th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2023 DOI: https://doi.org/10.1109/ITAIC58329.2023.10408883

M. Pejanović-Djurišić ve S. Kuklinski, "5G Security Landscape: Concept and Remaining Challenges," 30th Telecommunications Forum (TELFOR), Belgrad, Sırbistan, 2022 DOI: https://doi.org/10.1109/TELFOR56187.2022.9983722

Ben Henda, N. (2020). "Overview on the Security in 5G Phase 2," Journal of ICT Standardization, 8(1), 1-14. DOI: https://doi.org/10.13052/jicts2245-800X.811

Most read articles by the same author(s)