Main Article Content
Maximum user systems on 5G networks will now not be consumer phones or computers, but IoT device. Via 2021, there might be about 30 billion such devices. The quantity of attacks on the IoT is growing. Device protection is terrible and malware distribution is without problems scalable. Protection has ended up the primary challenge in many telecommunications industries these days as risks may have high outcomes. especially, because the center and enable technologies might be related to the 5G network, the confidential information will pass at all layers in destiny Wi-Fi structures. Even with modern-day 4G networks, now not each operator succeeds in securely configuring the center network and protecting it from all angles. As SDN and NFV are carried out for network cutting in 5G, the administration will become even extra difficult. Flexibility in 5G networks comes at the fee of multiplied complexity and high bandwidth communication settings to monitor. 5G will offer broadband access anywhere, entertain better person mobility, and permit connectivity of a large number of devices in an ultra- reliable and low-priced manner. Furthermore, we present protection solutions to those demanding situations and future instructions for secure 5G systems.
Celdrán, A. H., Pérez, M. G., García Clemente, F. J., & Pérez, G. M. (2017). Automatic monitoring management for 5G mobile networks. In Procedia Computer Science (Vol. 110, pp. 328–335). https://doi.org/10.1016/j.procs.2017.06.102
Dahiya, M. (2017). Need and Advantages of 5G wireless Communication Systems Network Security View project Need and Advantages of 5G wireless Communication Systems. International Journal of Advance Research in Computer Science and Management Studies, 5(6). Retrieved from https://www.researchgate.net/publication/321864810
Gkonis, P. K., Trakadas, P. T., & Kaklamani, D. I. (2020). A comprehensive study on simulation techniques for 5G networks: State of the art results, analysis, and future challenges. Electronics (Switzerland). https://doi.org/10.3390/electronics9030468
Gaber, C., Vilchez, J. S., Gur, G., Chopin, M., Perrot, N., Grimault, J. L., & Wary, J. P. (2020). Liability-Aware Security Management for 5G. In 2020 IEEE 3rd 5G World Forum, 5GWF 2020 - Conference Proceedings (pp. 133–138). https://doi.org/10.1109/5GWF49715.2020.9221407
Gupta, A., Jha, R. K., Gandotra, P., & Jain, S. (2018). Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network. IEEE Transactions on Vehicular Technology, 67(1),618–632. https://doi.org/10.1109/TVT.2017.2745110
Irazabal, M., Lopez-Aguilera, E., & Demirkol, I. (2019). Active Queue Management as Quality of Service Enabler for 5G Networks. In 2019 European Conference on Networks and Communications, EuCNC 2019 (pp. 421–426). https://doi.org/10.1109/EuCNC.2019.8802027
Jinsong, M., & Yamin, M. (2020). 5G network and security. In Proceedings of the 7th International Conference on Computing for Sustainable Global Development, INDIACom 2020 (pp. 249–254). https://doi.org/10.23919/INDIACom49435.2020.9083731
Ji, X., Huang, K., Jin, L., Tang, H., Liu, C., Zhong, Z., … Yi, M. (2018). Overview of 5G security technology. Science China Information Sciences. https://doi.org/10.1007/s11432-017-9426-4
Kumari, K. A., Akash, S. A., Sadasivam, G. S., Radhika, E. G., & Gowri, S. S. (2018). An Approach for End-to-End (E2E) Security of 5G Applications. In Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE
International Conference on Intelligent Data and Security, IDS 2018 (pp. 133–138). https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00038
Kim, J. T., Koh, C., & Choi, J. T. (2003). A protection of mobile system in network systems. In Proceedings of the International Conference on Security and Management (Vol. 2, pp. 426–432).
Kursheed, B., & Budyal, V. R. (2020). Survey: 5G wireless communication using cognitive radio. Indian Journal of Computer Science and Engineering, 11(5), 658–669. https://doi.org/10.21817/indjcse/2020/v11i5/201105231
Liyanage, M., Porambage, P., & Ding, A. Y. (2018). Five driving forces of multi-access edge computing. arXiv.
Mullins, Robert; Taynann, M. (2017). Cognitive Network Management for 5G. 5GPPP Working Group on Network Management and QoS, 1.02, 1–40. Retrieved from https://5g- ppp.eu/wp-content/uploads/2016/11/NetworkManagement_WhitePaper_1.0.pdf
Munisankaraiah, S., & Arun Kumar, A. (2017). Physical layer security in 5G wireless networks for data protection. In Proceedings on 2016 2nd International Conference on Next Generation Computing Technologies, NGCT 2016 (pp. 883–887). https://doi.org/10.1109/NGCT.2016.7877535
Olimid, R. F., & Nencioni, G. (2020). 5G Network Slicing: A Security Overview. IEEE Access. https://doi.org/10.1109/ACCESS.2020.2997702
Panwar, N., & Sharma, S. (2020). Security and Privacy Aspects in 5G Networks. In 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020. https://doi.org/10.1109/NCA51143.2020.9306740
Ricart-Sanchez, R., Malagon, P., Alcaraz-Calero, J. M., & Wang, Q. (2018). Hardware- Accelerated Firewall for 5G Mobile Networks. In Proceedings - International Conference on Network Protocols, ICNP (Vol. 2018–September, pp. 446–447). https://doi.org/10.1109/ICNP.2018.00066
Salva-Garcia, P., Alcaraz-Calero, J. M., Wang, Q., Bernabe, J. B., & Skarmeta, A. (2018).
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks. Security and Communication Networks, 2018. https://doi.org/10.1155/2018/9291506
Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K. K., & Gao, X. (2018). A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE Journal on Selected Areas in Communications, 36(4), 679–695. https://doi.org/10.1109/JSAC.2018.2825560
Zhan, W., & Tao, Z. (2020). Research on 5G Mobile Communication Network Security Technology. In Journal of Physics: Conference Series (Vol. 1634). https://doi.org/10.1088/1742-6596/1634/1/012055
Supriya, S., Bharathi, B. (2015). Efficient privacy preserving authentication for vehicular Ad-Hoc Networks. ARP Journal of Engineering and Applied Science 10(20), PP. 9233 – 9240