Security in 5G Networks: A Systematic Analysis of High-Speed Data Connections

Main Article Content

V. Maruthi Prasad
B. Bharathi


Maximum user systems on 5G networks will now not be consumer phones or computers, but IoT device. Via 2021, there might be about 30 billion such devices. The quantity of attacks on the IoT is growing. Device protection is terrible and malware distribution is without problems scalable. Protection has ended up the primary challenge in many telecommunications industries these days as risks may have high outcomes. especially, because the center and enable technologies might be related to the 5G network, the confidential information will pass at all layers in destiny Wi-Fi structures. Even with modern-day 4G networks, now not each operator succeeds in securely configuring the center network and protecting it from all angles. As SDN and NFV are carried out for network cutting in 5G, the administration will become even extra difficult. Flexibility in 5G networks comes at the fee of multiplied complexity and high bandwidth communication settings to monitor. 5G will offer broadband access anywhere, entertain better person mobility, and permit connectivity of a large number of devices in an ultra- reliable and low-priced manner. Furthermore, we present protection solutions to those demanding situations and future instructions for secure 5G systems.

Article Details

How to Cite
Prasad, V. M. ., & Bharathi, B. . (2023). Security in 5G Networks: A Systematic Analysis of High-Speed Data Connections. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5), 216–222.


Celdrán, A. H., Pérez, M. G., García Clemente, F. J., & Pérez, G. M. (2017). Automatic monitoring management for 5G mobile networks. In Procedia Computer Science (Vol. 110, pp. 328–335).

Dahiya, M. (2017). Need and Advantages of 5G wireless Communication Systems Network Security View project Need and Advantages of 5G wireless Communication Systems. International Journal of Advance Research in Computer Science and Management Studies, 5(6). Retrieved from

Gkonis, P. K., Trakadas, P. T., & Kaklamani, D. I. (2020). A comprehensive study on simulation techniques for 5G networks: State of the art results, analysis, and future challenges. Electronics (Switzerland).

Gaber, C., Vilchez, J. S., Gur, G., Chopin, M., Perrot, N., Grimault, J. L., & Wary, J. P. (2020). Liability-Aware Security Management for 5G. In 2020 IEEE 3rd 5G World Forum, 5GWF 2020 - Conference Proceedings (pp. 133–138).

Gupta, A., Jha, R. K., Gandotra, P., & Jain, S. (2018). Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network. IEEE Transactions on Vehicular Technology, 67(1),618–632.

Irazabal, M., Lopez-Aguilera, E., & Demirkol, I. (2019). Active Queue Management as Quality of Service Enabler for 5G Networks. In 2019 European Conference on Networks and Communications, EuCNC 2019 (pp. 421–426).

Jinsong, M., & Yamin, M. (2020). 5G network and security. In Proceedings of the 7th International Conference on Computing for Sustainable Global Development, INDIACom 2020 (pp. 249–254).

Ji, X., Huang, K., Jin, L., Tang, H., Liu, C., Zhong, Z., … Yi, M. (2018). Overview of 5G security technology. Science China Information Sciences.

Kumari, K. A., Akash, S. A., Sadasivam, G. S., Radhika, E. G., & Gowri, S. S. (2018). An Approach for End-to-End (E2E) Security of 5G Applications. In Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE

International Conference on Intelligent Data and Security, IDS 2018 (pp. 133–138).

Kim, J. T., Koh, C., & Choi, J. T. (2003). A protection of mobile system in network systems. In Proceedings of the International Conference on Security and Management (Vol. 2, pp. 426–432).

Kursheed, B., & Budyal, V. R. (2020). Survey: 5G wireless communication using cognitive radio. Indian Journal of Computer Science and Engineering, 11(5), 658–669.

Liyanage, M., Porambage, P., & Ding, A. Y. (2018). Five driving forces of multi-access edge computing. arXiv.

Mullins, Robert; Taynann, M. (2017). Cognitive Network Management for 5G. 5GPPP Working Group on Network Management and QoS, 1.02, 1–40. Retrieved from https://5g-

Munisankaraiah, S., & Arun Kumar, A. (2017). Physical layer security in 5G wireless networks for data protection. In Proceedings on 2016 2nd International Conference on Next Generation Computing Technologies, NGCT 2016 (pp. 883–887).

Olimid, R. F., & Nencioni, G. (2020). 5G Network Slicing: A Security Overview. IEEE Access.

Panwar, N., & Sharma, S. (2020). Security and Privacy Aspects in 5G Networks. In 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020.

Ricart-Sanchez, R., Malagon, P., Alcaraz-Calero, J. M., & Wang, Q. (2018). Hardware- Accelerated Firewall for 5G Mobile Networks. In Proceedings - International Conference on Network Protocols, ICNP (Vol. 2018–September, pp. 446–447).

Salva-Garcia, P., Alcaraz-Calero, J. M., Wang, Q., Bernabe, J. B., & Skarmeta, A. (2018).

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks. Security and Communication Networks, 2018.

Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K. K., & Gao, X. (2018). A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679–695.

Zhan, W., & Tao, Z. (2020). Research on 5G Mobile Communication Network Security Technology. In Journal of Physics: Conference Series (Vol. 1634).

Supriya, S., Bharathi, B. (2015). Efficient privacy preserving authentication for vehicular Ad-Hoc Networks. ARP Journal of Engineering and Applied Science 10(20), PP. 9233 – 9240