A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

DC FieldValueLanguage
dc.contributor.authorKhan, Rabia-
dc.contributor.authorKumar, Pardeep-
dc.contributor.authorJayakody, Dushantha Nalin K.-
dc.contributor.authorLiyanage, Madhusanka-
dc.date.accessioned2019-10-23T14:19:51Z-
dc.date.available2019-10-23T14:19:51Z-
dc.date.copyright2019 IEEEen_US
dc.date.issued2019-07-
dc.identifier.citationIEEE Communications Surveys & Tutorialsen_US
dc.identifier.issn1553-877X-
dc.identifier.urihttp://hdl.handle.net/10197/11170-
dc.description.abstractSecurity has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.en_US
dc.description.sponsorshipEuropean Commissionen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.rights© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.subject5G mobile communicationen_US
dc.subjectPrivacyen_US
dc.subjectTutorialsen_US
dc.subjectBusinessen_US
dc.subjectTelecommunicationsen_US
dc.subjectAuthenticationen_US
dc.titleA Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directionsen_US
dc.typeJournal Articleen_US
dc.internal.authorcontactothermadhusanka@ucd.ieen_US
dc.statusPeer revieweden_US
dc.identifier.volume22en_US
dc.identifier.issue1en_US
dc.identifier.startpage196en_US
dc.identifier.endpage248en_US
dc.identifier.doi10.1109/comst.2019.2933899-
dc.neeo.contributorKhan|Rabia|aut|-
dc.neeo.contributorKumar|Pardeep|aut|-
dc.neeo.contributorJayakody|Dushantha Nalin K.|aut|-
dc.neeo.contributorLiyanage|Madhusanka|aut|-
dc.description.othersponsorshipNational Research Tomsk Polytechnic Universityen_US
dc.description.adminUpdate citation details during checkdate report - ACen_US
dc.date.updated2019-09-07T21:14:01Z-
dc.identifier.grantidH2020-MSCA-IF-2017-
dc.identifier.grantidNo: 789658-
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:Computer Science Research Collection
Files in This Item:
File Description SizeFormat 
5G_Security_Survey__Revision___Clean___Copy_.pdf9.22 MBAdobe PDFDownload
Show simple item record

SCOPUSTM   
Citations 20

15
Last Week
0
Last month
checked on Sep 12, 2020

Page view(s)

467
Last Week
6
Last month
59
checked on Oct 26, 2020

Download(s) 5

1,978
checked on Oct 26, 2020

Google ScholarTM

Check

Altmetric


This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.