Overview of 5G & Beyond Security
DOI:
https://doi.org/10.4108/eetiot.v8i30.1624Keywords:
5G & Beyond, Network Security, Internet of Things, Software-Defined Networking, Network Function VirtualizationAbstract
Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences, and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth Generation (5G) and security aspect. This is more predictable since the core technology; the synonymous approach is possible with Fifth Generation (5G) and Beyond Technologies though with limited access. Many incidents have shown that the possibility of a hacked wireless network, not just impacts privacy and security worries, but also hinders the diverse dynamics of the ecosystem. Security attacks have grown in frequency and severity throughout the near past, making detection mechanisms harder.
Downloads
References
M. Agarwal, A. Roy and N. Saxena, "Next generation 5g wireless networks: a comprehensive survey," IEEE Communication Surveys and Tutorial. vol. 18, no. 3, pp. 1617–1655, 2016. DOI: https://doi.org/10.1109/COMST.2016.2532458
L. Zhao, D. Zhu, W. Shafik, S. M. Matinkhah, Z. Ahmad et al., “Artificial intelligence analysis in cyber domain: A review,” International Journal of Distributed Sensor Networks, vol. 18, no. 4, pp. 15501329221084882, 2022.
W. Shafik, S. M. Matinkhah, F. Shokoor and L. Sharif, “A reawakening of machine learning application in unmanned aerial vehicle: future research motivation,” EAI Endorsed Trans. Internet Things, vol. 8, no. 29, pp. e3–e3, 2022.
A. Irshad, S. A. Chaudhry, A. Ghani and M. Bilal, "A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment" Computer Networks, vol. 195, pp. 108219, 2021.
W. Shafik, S. M. Matinkhah and F. Shokoor, “Recommendation system comparative analysis: internet of things aided networks”, EAI Endorsed Trans IoT, vol. 8, no. 29, pp. 5, 2022.
G. Maier and M. Reisslein, "Transport sdn at the dawn of the 5g era," Optical Switching and Networking, vol. 33, pp. 34-40, 2019.
W. Shafik, S. M. Matinkhah, S. S. Afolabi and M. N. Sanda, “A 3-dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations,” International Journal of Advances in Applied Sciences, vol. 2252, no. 8814, pp. 8814, 2020.
H. Meng, W. Shafik, S. M. Matinkhah and Z. Ahmad, “A 5g beam selection machine learning algorithm for unmanned aerial vehicle applications,” Wirel. Commun. Mob. Comput., 2020.
M. S. Bonfim, K. L. Dias and S. F. L. Fernandes, "Integrated nfv/sdn architectures: a systematic literature review," ACM Computing Surveys, vol. 51, no. 6, 2020.
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “A fast machine learning for 5g beam selection for unmanned aerial vehicle applications,” Journal of Information Systems and Telecommunication, vol. 7, no. 28, pp. 262–278, 2019.
W. Shafik, S. M. Matinkhah and M. Ghasemzadeh, “A mobile fuzzy sink scheme for wireless sensor network period improvement,” 8th Iranian Joint Congress on Fuzzy and intelligent Systems, Mashhad, Iran, pp. 211–216, 2020.
S. Kitanov, B. Popovski and T. Janevski, "Quality evaluation of cloud and fog computing services in 5g networks," Enabling Technologies and Architectures for Next-Generation Networking Capabilities, pp. 1-36, 2019.
A. Irshad, S. A. Chaudhry, A. Ghani, G. A. Mallah, M. Bilal, B. A. Alzahrani, "A low-cost privacy preserving user access in mobile edge computing framework" Computers & Electrical Engineering, vol. 98, 107692, 2022.
W. Shafik, M. Matinkhah, M. Asadi, Z. Ahmadi and Z. Hadiyan, “A study on internet of things performance evaluation,” Journal of Communications Technology, Electronics and Computer Science, pp. 1–19, 2020.
S. A. Chaudhry, A. Irshad, M. M. Khan, S. A. Khan, S. Nosheen, A. A. AlZubi, and Y. B. Zikria "A Lightweight authentication scheme for 6G-IoT enabled maritime transport system." IEEE Transactions on Intelligent Transportation Systems, 2021.
R. Ahmed, A.K. Malviya, M.J. Kaur and V.P. Mishra, "Comprehensive survey of key technologies enabling 5g-iot," 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), Siltanpur, UP, India, pp.1-5, 2019.
L. Shao-Yu, C.C. Tseng, I. Moerman and L. Badia, "Recent advances in 5g technologies," New Radio Access and Networking, pp. 1-9, 2019.
W. Shafik and S. M. Matinkhah, “Admitting new requests in fog networks according to erlang b distribution,” 27th Iranian Conference on Electrical Engineering, Yazd, Iran, 2019.
A. Irshad, S. A. Chaudhry, M. Alazab, A. Kanwal, M. S. Zia and Y. B. Zikria, "A secure demand response management authentication scheme for smart grid." Sustainable Energy Technologies and Assessments, 48, 101571, 2021.
M. Azrour, J. Mabrouki, A. Guezzaz et al., "Internet of Things Security: Challenges and Key Issues" Security and Communication Networks, 2021.
A. Gupta and R.K. Jhk, "a survey of 5g network: architecture and emerging technologies", IEEE Journals & Magazine, vol.3, pp. 1206-1232, 2020.
[22] Y. Jun, A. Craig, W. Shafik and L. Sharif, “Artificial intelligence application in cybersecurity and cyberdefense,”Wireless Communications and Mobile Computing, vol. 2021.
S. M. Matinkhah, W. Shafik and M. Ghasemzadeh, “Emerging artificial intelligence application: reinforcement learning issues on current internet of things,” in 2019 16th international Conference in information knowledge and Technology, Tehran, Iran, 2019.
A. Gohil, H. Modi and S.K. Patel, "5G technology of mobile communication: A survey," International Conference on Intelligent Systems and Signal Processing (ISSP), Gujarat, pp. 288–292, 2013.
N. Panwar, S. Sharma and A.K. Singh, "A survey on 5G: The next generation of mobile communication," Physical Communication, vol. 18, pp. 64–84, 2016.
M. Jaber, M.A. Imran, R. Tafazolli and A. Tukmanov, "5G backhaul challenges and emerging research directions: a survey," IEEE Access, vol. 4, pp. 1743–1766, 2016.
R.N. Mitra and D.P. Agrawal, "5G mobile technology: A survey," ICT Express, vol. 1, no. 3, pp. 132–137, 2015.
I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5g security challenges and solutions," IEEE Communication Standard Magazine, vol. 2, no. 1, pp. 36–43, 2018.
M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos and H. Janicke, "Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes," Journal of Network Computing Application, vol. 101, pp. 55–82, 2018.
G. Choudhary and V. Sharma, "A survey on the security and the evolution of osmotic and catalytic computing for 5g networks," in 5G Enabled Secure Wireless Networks, Springer International Publishing, pp. 69–102, 2019.
M. Chen, Y. Qian, S. Mao, W. Tang and X. Yang, "Software-defined mobile networks security," Mobile Network Application, vol. 21, no. 5, pp. 729–743, 2016.
P. Gandotra and R.K. Jha, "A survey on green communication and security challenges in 5G wireless communication networks," Journal of Network Computing Application, vol. 96, pp. 39–61, 2017.
W. Shafik, S. M. Matinkhah, and M. Ghasemazade, “Fog-mobile edge performance evaluation and analysis on internet of things,” Journal of Advance Research in Mobile Computing, vol. 1, no. 3, pp. 1–17, 2019.
Z. Yang, L. Jianjun, H. Faqiri, W. Shafik, A. T. Abdulrahman, Yusuf M, Sharawy AM. et al., “Green internet of things and big data application in smart cities development,” Complexity, 2021.
W. Shafik and S. M. Matinkhah, “How to use Erlang B to determine the blocking probability of packet loss in a wireless communication,” 13th Symposium on Advances in Science & Technology, Mashhad, Tehran 2018.
Y. Lin, Z. Ahmad, W. Shafik, S. K. Khosa, Z. Almaspoor et al., “Impact of facebook and newspaper advertising on sales: a comparative study of online and print media,” Computational intelligence and neuroscience, 2021.
Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A survey on wireless security: technical challenges, recent advances, and future trends," IEEE Journals & Magazine, vol. 104, no. 9, pp. 1727-1765, 2020.
Y.E.H.E. Idrissi, N. Zahid and M. Jedra, "Security analysis of 3gpp (lte) — wlan interworking and a new local authentication method based on eap-aka," in The First International Conference on Future Generation Communication Technologies, London, England, pp. 137–142, 2012.
M. Liyanage and A. Gurtov, "Secured vpn models for lte backhaul networks," in IEEE Vehicular Technology Conference (VTC Fall), Quebec City, Canada, pp. 1–5, 2012.
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Internet of things-based energy management, challenges, and solutions in smart cities,” Journal of Communications Technology, Electronics and Computer Science., vol. 27, pp. 1–11, 2020.
M. Liyanage, M. Ylianttila and A. Gurtov, "Ip-based virtual private network implementations in future cellular networks," Handbook of Research on Progressive Trends in Wireless Communications and Networking, pp. 44-66, 2020.
S. Gold, "The rebirth of phreaking," Network Security, vol. 2011, no. 6, pp. 15-17, 2011.
J. Granjal, E. Monteiro and J. Sá Silva, "Security for the internet of things: a survey of existing protocols and open research issues," IEEE Communication Survey Tutorial, vol. 17, no. 3, pp. 1294–1312, 2015.
W. Shafik and S. A. Mostafavi, “Knowledge engineering on internet of things through reinforcement learning,” International Journal of Computer Applications, vol. 975, pp. 8887, 2019.
W. Shafik, M. Matinkhah, and M. N. Sanda, “Network resource management drives machine learning: a survey and future research direction,” Journal of Communications Technology, Electronics and Computer Science, pp. 1–15, 2020.
W. Shafik and S. M. Matinkhah, “Privacy issues in social Web of things,” 5th International Conference on Web Research, Tehran, Islamic Republic of Iran, pp. 208–214.
X. Zhang, A. Kunz and S. Schröder, "Overview of 5g security in 3gpp," in IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland, pp. 181–186. 2017.
M. H. Eiza, Q. Ni and Q. Shi, "Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks," IEEE Transaction on Vehicular Technology, vol. 65, no. 10, pp. 7868–7881, 2016.
Z. Chen, F. Zhang, P. Zhang, J.K. Liu and J. Huang, "Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control," Future Generation Computer System, vol. 87, pp. 717-724, 2018.
W. Shafik, M. Matinkhah, P. Etemadinejad, and M. N. Sanda, “Reinforcement learning rebirth, techniques, challenges, and resolutions,” International Journal on Informatics Visualization, vol. 4, no. 3, pp. 127–135, 2020.
S. M. Matinkhah and W. Shafik, “Smart grid empowered by 5G technology,” in 2019 Smart Grid Conference (SGC), Tehran, Iran, pp. 1–6, 2019.
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Theoretical understanding of deep learning in uav biomedical engineering technologies analysis,” SN Computer Science, vol. 1, no. 6, pp. 1–13, 2020.
S. Choi, J. Song, J. Kim, S. Lim, S. Choi, etl., "5g k-simnet: end-to-end performance evaluation of 5g cellular systems," in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, United States of America, pp. 1-6, 2019.
S. Gupta, B.L. Parne and N.S. Chaudhari, "Security vulnerabilities in handover authentication mechanism of 5g network," in First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp. 369–374, 2018.
M. S. Berger and H. L. Christiansen, "Fronthaul for cloud-ran enabling network slicing in 5g mobile networks," Wireless Communications and Mobile Computing, vol. 2018, 2020.
W. Shafik and S. M. Matinkhah, “A Portable Fuzzy sink scheme for wireless sensor network life expectancy enhancement,” IEEE Iranian Joint Congress on Fuzzy and intelligent Systems, 2020.
S. M. Matinkhah and W. Shafik, “A study on financial pricing and applications models on 5g,” 4th International Conference in Financial Mathematics, Yazd, Iran, pp. 54-60, 2019.
S. M. Matinkhah and W. Shafik, “Broadcast communication analysis for 5g media radio access networks,” In 16th Conference on Broadcast and Exhibition, Tehran, Iran, 2019.
T.Q. Thanh, S. Covaci and T. Magedanz, "Viseco: an annotated security management framework for 5g," In International Conference on Mobile, Secure, and Programmable Networking, Mohammedia, Morocco pp. 251-269, 2018.
F. Al-Turjman, "5g-enabled devices and smart-spaces in social-iot: an overview," Future Generation Computing System, vol. 92, pp. 732–744, 2019.
M. Agiwal, N. Saxena and A. Roy, "Towards connected living: 5g enabled internet of things (iot)," IETE Technical Review, vol. 36, no. 2, pp. 190-202, 2019.
S. Sharmeen, S. Huda, J.H. Abawajy, W.N. Ismail and M.M. Hassan, "Malware threats and detection for industrial mobile-iot networks," IEEE Access, vol. 6, pp. 15941–15957, 2018.
F. Jameel, M.A. Javed, D.N.K. Jayakody and S.A. Hassan, "On secrecy performance of industrial internet of things," Internet Technology Letters, vol. 1, no. 2 pp. 1-32, 2020.
S. Mostafavi and W. Shafik, “Fog computing architectures, privacy and security solutions,” Journal of Communications Technology, Electronics and Computer Science, vol. 24, pp. 1–14, 2019.
W. Shafik, S. M. Matinkhah, M. N. Sanda, and F. Shokoor, “Internet of things-based energy efficiency optimization model in fog smart cities,” International Journal on Informatics Visualization, vol. 5, no. 2, pp. 105–112, 2021.
W. Shafik and S. M. Matinkhah, “Unmanned aerial vehicles analysis to social networks performance,” CSI Journal on Computer Science and Engineering, vol. 18, no. 2, pp. 24-31, 2021.
F. Pan, Z. Pang, M. Luvisotto, M. Xiao and H. Wen, "Physical-layer security for industrial wireless control systems: basics and future directions," IEE Industrial. Electronic Magazine, vol. 12, no. 4, pp. 18–27, 2018.
C. Li, Z. Qin, E. Novak and Q. Li, "Securing sdn infrastructure of iot–fog networks from mitm attacks," IEEE Internet Things Journal, vol. 4, no. 5, pp. 1156–1164, 2017.
W. Shafik, S. M. Matinkhah and S. "Dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations," International Journal of Advances in Applied Sciences, 2252, no. 8814, pp. 8814, 2020.
M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating critical security issues of the iot world: present and future challenges," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018.
J. Pacheco, D. Ibarra, A. Vijay and S. Hariri, "IoT security framework for smart water system," in IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, pp. 1285–1292, 2017.
S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury and E. Bertino, "Insecure connection bootstrapping in cellular networks," Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, Florida, pp. 1-11, 2019.
C. Cremers and M. Dehnel-Wild, "Component-based formal analysis of 5G-AKA channel assumptions and session confusion," Network and Distributed System Security Symposium (NDSS), pp. 21-27, 2019.
R. Borgaonkar, L. Hirschi, S. Park and A. Shaik, "New privacy threat on 3g, 4g, and upcoming 5g aka protocols," Proceeding on Privacy Enhancing Technology, vol. 2019, no. 3, pp. 108–127, 2019.
S. Behrad, E. Bertin and N. Crespi, "Securing authentication for mobile networks, a survey on 4G issues and 5G answers," in 21st Conference on Innovation in [1] M. Agarwal, A. Roy and N. Saxena, "Next generation 5g wireless networks: a comprehensive survey," IEEE Communication Surveys and Tutorial. vol. 18, no. 3, pp. 1617–1655, 2016.
L. Zhao, D. Zhu, W. Shafik, S. M. Matinkhah, Z. Ahmad et al., “Artificial intelligence analysis in cyber domain: A review,” International Journal of Distributed Sensor Networks, vol. 18, no. 4, pp. 15501329221084882, 2022. DOI: https://doi.org/10.1177/15501329221084882
W. Shafik, S. M. Matinkhah, F. Shokoor and L. Sharif, “A reawakening of machine learning application in unmanned aerial vehicle: future research motivation,” EAI Endorsed Trans. Internet Things, vol. 8, no. 29, pp. e3–e3, 2022. DOI: https://doi.org/10.4108/eetiot.v8i29.987
A. Irshad, S. A. Chaudhry, A. Ghani and M. Bilal, "A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment" Computer Networks, vol. 195, pp. 108219, 2021. DOI: https://doi.org/10.1016/j.comnet.2021.108219
W. Shafik, S. M. Matinkhah and F. Shokoor, “Recommendation system comparative analysis: internet of things aided networks”, EAI Endorsed Trans IoT, vol. 8, no. 29, pp. 5, 2022. DOI: https://doi.org/10.4108/eetiot.v8i29.1108
G. Maier and M. Reisslein, "Transport sdn at the dawn of the 5g era," Optical Switching and Networking, vol. 33, pp. 34-40, 2019. DOI: https://doi.org/10.1016/j.osn.2019.02.001
W. Shafik, S. M. Matinkhah, S. S. Afolabi and M. N. Sanda, “A 3-dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations,” International Journal of Advances in Applied Sciences, vol. 2252, no. 8814, pp. 8814, 2020. DOI: https://doi.org/10.11591/ijaas.v10.i1.pp28-38
H. Meng, W. Shafik, S. M. Matinkhah and Z. Ahmad, “A 5g beam selection machine learning algorithm for unmanned aerial vehicle applications,” Wirel. Commun. Mob. Comput., 2020. DOI: https://doi.org/10.1155/2020/1428968
M. S. Bonfim, K. L. Dias and S. F. L. Fernandes, "Integrated nfv/sdn architectures: a systematic literature review," ACM Computing Surveys, vol. 51, no. 6, 2020. DOI: https://doi.org/10.1145/3172866
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “A fast machine learning for 5g beam selection for unmanned aerial vehicle applications,” Journal of Information Systems and Telecommunication, vol. 7, no. 28, pp. 262–278, 2019.
W. Shafik, S. M. Matinkhah and M. Ghasemzadeh, “A mobile fuzzy sink scheme for wireless sensor network period improvement,” 8th Iranian Joint Congress on Fuzzy and intelligent Systems, Mashhad, Iran, pp. 211–216, 2020. DOI: https://doi.org/10.1109/CFIS49607.2020.9238684
S. Kitanov, B. Popovski and T. Janevski, "Quality evaluation of cloud and fog computing services in 5g networks," Enabling Technologies and Architectures for Next-Generation Networking Capabilities, pp. 1-36, 2019. DOI: https://doi.org/10.4018/978-1-5225-6023-4.ch001
A. Irshad, S. A. Chaudhry, A. Ghani, G. A. Mallah, M. Bilal, B. A. Alzahrani, "A low-cost privacy preserving user access in mobile edge computing framework" Computers & Electrical Engineering, vol. 98, 107692, 2022. DOI: https://doi.org/10.1016/j.compeleceng.2022.107692
W. Shafik, M. Matinkhah, M. Asadi, Z. Ahmadi and Z. Hadiyan, “A study on internet of things performance evaluation,” Journal of Communications Technology, Electronics and Computer Science, pp. 1–19, 2020.
S. A. Chaudhry, A. Irshad, M. M. Khan, S. A. Khan, S. Nosheen, A. A. AlZubi, and Y. B. Zikria "A Lightweight authentication scheme for 6G-IoT enabled maritime transport system." IEEE Transactions on Intelligent Transportation Systems, 2021. DOI: https://doi.org/10.1109/TITS.2021.3134643
R. Ahmed, A.K. Malviya, M.J. Kaur and V.P. Mishra, "Comprehensive survey of key technologies enabling 5g-iot," 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), Siltanpur, UP, India, pp.1-5, 2019. DOI: https://doi.org/10.2139/ssrn.3351007
L. Shao-Yu, C.C. Tseng, I. Moerman and L. Badia, "Recent advances in 5g technologies," New Radio Access and Networking, pp. 1-9, 2019. DOI: https://doi.org/10.1155/2019/8202048
W. Shafik and S. M. Matinkhah, “Admitting new requests in fog networks according to erlang b distribution,” 27th Iranian Conference on Electrical Engineering, Yazd, Iran, 2019. DOI: https://doi.org/10.1109/IranianCEE.2019.8786518
A. Irshad, S. A. Chaudhry, M. Alazab, A. Kanwal, M. S. Zia and Y. B. Zikria, "A secure demand response management authentication scheme for smart grid." Sustainable Energy Technologies and Assessments, 48, 101571, 2021. DOI: https://doi.org/10.1016/j.seta.2021.101571
M. Azrour, J. Mabrouki, A. Guezzaz et al., "Internet of Things Security: Challenges and Key Issues" Security and Communication Networks, 2021. DOI: https://doi.org/10.1155/2021/5533843
A. Gupta and R.K. Jhk, "a survey of 5g network: architecture and emerging technologies", IEEE Journals & Magazine, vol.3, pp. 1206-1232, 2020. DOI: https://doi.org/10.1109/ACCESS.2015.2461602
[22] Y. Jun, A. Craig, W. Shafik and L. Sharif, “Artificial intelligence application in cybersecurity and cyberdefense,”Wireless Communications and Mobile Computing, vol. 2021. DOI: https://doi.org/10.1155/2021/3329581
S. M. Matinkhah, W. Shafik and M. Ghasemzadeh, “Emerging artificial intelligence application: reinforcement learning issues on current internet of things,” in 2019 16th international Conference in information knowledge and Technology, Tehran, Iran, 2019.
A. Gohil, H. Modi and S.K. Patel, "5G technology of mobile communication: A survey," International Conference on Intelligent Systems and Signal Processing (ISSP), Gujarat, pp. 288–292, 2013. DOI: https://doi.org/10.1109/ISSP.2013.6526920
N. Panwar, S. Sharma and A.K. Singh, "A survey on 5G: The next generation of mobile communication," Physical Communication, vol. 18, pp. 64–84, 2016. DOI: https://doi.org/10.1016/j.phycom.2015.10.006
M. Jaber, M.A. Imran, R. Tafazolli and A. Tukmanov, "5G backhaul challenges and emerging research directions: a survey," IEEE Access, vol. 4, pp. 1743–1766, 2016. DOI: https://doi.org/10.1109/ACCESS.2016.2556011
R.N. Mitra and D.P. Agrawal, "5G mobile technology: A survey," ICT Express, vol. 1, no. 3, pp. 132–137, 2015. DOI: https://doi.org/10.1016/j.icte.2016.01.003
I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5g security challenges and solutions," IEEE Communication Standard Magazine, vol. 2, no. 1, pp. 36–43, 2018. DOI: https://doi.org/10.1109/MCOMSTD.2018.1700063
M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos and H. Janicke, "Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes," Journal of Network Computing Application, vol. 101, pp. 55–82, 2018. DOI: https://doi.org/10.1016/j.jnca.2017.10.017
G. Choudhary and V. Sharma, "A survey on the security and the evolution of osmotic and catalytic computing for 5g networks," in 5G Enabled Secure Wireless Networks, Springer International Publishing, pp. 69–102, 2019. DOI: https://doi.org/10.1007/978-3-030-03508-2_3
M. Chen, Y. Qian, S. Mao, W. Tang and X. Yang, "Software-defined mobile networks security," Mobile Network Application, vol. 21, no. 5, pp. 729–743, 2016. DOI: https://doi.org/10.1007/s11036-015-0665-5
P. Gandotra and R.K. Jha, "A survey on green communication and security challenges in 5G wireless communication networks," Journal of Network Computing Application, vol. 96, pp. 39–61, 2017. DOI: https://doi.org/10.1016/j.jnca.2017.07.002
W. Shafik, S. M. Matinkhah, and M. Ghasemazade, “Fog-mobile edge performance evaluation and analysis on internet of things,” Journal of Advance Research in Mobile Computing, vol. 1, no. 3, pp. 1–17, 2019.
Z. Yang, L. Jianjun, H. Faqiri, W. Shafik, A. T. Abdulrahman, Yusuf M, Sharawy AM. et al., “Green internet of things and big data application in smart cities development,” Complexity, 2021. DOI: https://doi.org/10.1155/2021/4922697
W. Shafik and S. M. Matinkhah, “How to use Erlang B to determine the blocking probability of packet loss in a wireless communication,” 13th Symposium on Advances in Science & Technology, Mashhad, Tehran 2018.
Y. Lin, Z. Ahmad, W. Shafik, S. K. Khosa, Z. Almaspoor et al., “Impact of facebook and newspaper advertising on sales: a comparative study of online and print media,” Computational intelligence and neuroscience, 2021. DOI: https://doi.org/10.1155/2021/5995008
Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A survey on wireless security: technical challenges, recent advances, and future trends," IEEE Journals & Magazine, vol. 104, no. 9, pp. 1727-1765, 2020. DOI: https://doi.org/10.1109/JPROC.2016.2558521
Y.E.H.E. Idrissi, N. Zahid and M. Jedra, "Security analysis of 3gpp (lte) — wlan interworking and a new local authentication method based on eap-aka," in The First International Conference on Future Generation Communication Technologies, London, England, pp. 137–142, 2012. DOI: https://doi.org/10.1109/FGCT.2012.6476561
M. Liyanage and A. Gurtov, "Secured vpn models for lte backhaul networks," in IEEE Vehicular Technology Conference (VTC Fall), Quebec City, Canada, pp. 1–5, 2012. DOI: https://doi.org/10.1109/VTCFall.2012.6399037
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Internet of things-based energy management, challenges, and solutions in smart cities,” Journal of Communications Technology, Electronics and Computer Science., vol. 27, pp. 1–11, 2020.
M. Liyanage, M. Ylianttila and A. Gurtov, "Ip-based virtual private network implementations in future cellular networks," Handbook of Research on Progressive Trends in Wireless Communications and Networking, pp. 44-66, 2020. DOI: https://doi.org/10.4018/978-1-4666-5170-8.ch003
S. Gold, "The rebirth of phreaking," Network Security, vol. 2011, no. 6, pp. 15-17, 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70064-2
J. Granjal, E. Monteiro and J. Sá Silva, "Security for the internet of things: a survey of existing protocols and open research issues," IEEE Communication Survey Tutorial, vol. 17, no. 3, pp. 1294–1312, 2015. DOI: https://doi.org/10.1109/COMST.2015.2388550
W. Shafik and S. A. Mostafavi, “Knowledge engineering on internet of things through reinforcement learning,” International Journal of Computer Applications, vol. 975, pp. 8887, 2019.
W. Shafik, M. Matinkhah, and M. N. Sanda, “Network resource management drives machine learning: a survey and future research direction,” Journal of Communications Technology, Electronics and Computer Science, pp. 1–15, 2020.
W. Shafik and S. M. Matinkhah, “Privacy issues in social Web of things,” 5th International Conference on Web Research, Tehran, Islamic Republic of Iran, pp. 208–214.
X. Zhang, A. Kunz and S. Schröder, "Overview of 5g security in 3gpp," in IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland, pp. 181–186. 2017. DOI: https://doi.org/10.1109/CSCN.2017.8088619
M. H. Eiza, Q. Ni and Q. Shi, "Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks," IEEE Transaction on Vehicular Technology, vol. 65, no. 10, pp. 7868–7881, 2016. DOI: https://doi.org/10.1109/TVT.2016.2541862
Z. Chen, F. Zhang, P. Zhang, J.K. Liu and J. Huang, "Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control," Future Generation Computer System, vol. 87, pp. 717-724, 2018. DOI: https://doi.org/10.1016/j.future.2017.10.022
W. Shafik, M. Matinkhah, P. Etemadinejad, and M. N. Sanda, “Reinforcement learning rebirth, techniques, challenges, and resolutions,” International Journal on Informatics Visualization, vol. 4, no. 3, pp. 127–135, 2020. DOI: https://doi.org/10.30630/joiv.4.3.376
S. M. Matinkhah and W. Shafik, “Smart grid empowered by 5G technology,” in 2019 Smart Grid Conference (SGC), Tehran, Iran, pp. 1–6, 2019. DOI: https://doi.org/10.1109/SGC49328.2019.9056590
W. Shafik, S. M. Matinkhah, and M. Ghasemzadeh, “Theoretical understanding of deep learning in uav biomedical engineering technologies analysis,” SN Computer Science, vol. 1, no. 6, pp. 1–13, 2020. DOI: https://doi.org/10.1007/s42979-020-00323-8
S. Choi, J. Song, J. Kim, S. Lim, S. Choi, etl., "5g k-simnet: end-to-end performance evaluation of 5g cellular systems," in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, United States of America, pp. 1-6, 2019. DOI: https://doi.org/10.1109/CCNC.2019.8651686
S. Gupta, B.L. Parne and N.S. Chaudhari, "Security vulnerabilities in handover authentication mechanism of 5g network," in First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, pp. 369–374, 2018. DOI: https://doi.org/10.1109/ICSCCC.2018.8703355
M. S. Berger and H. L. Christiansen, "Fronthaul for cloud-ran enabling network slicing in 5g mobile networks," Wireless Communications and Mobile Computing, vol. 2018, 2020. DOI: https://doi.org/10.1155/2018/4860212
W. Shafik and S. M. Matinkhah, “A Portable Fuzzy sink scheme for wireless sensor network life expectancy enhancement,” IEEE Iranian Joint Congress on Fuzzy and intelligent Systems, 2020. DOI: https://doi.org/10.20944/preprints202007.0659.v1
S. M. Matinkhah and W. Shafik, “A study on financial pricing and applications models on 5g,” 4th International Conference in Financial Mathematics, Yazd, Iran, pp. 54-60, 2019.
S. M. Matinkhah and W. Shafik, “Broadcast communication analysis for 5g media radio access networks,” In 16th Conference on Broadcast and Exhibition, Tehran, Iran, 2019.
T.Q. Thanh, S. Covaci and T. Magedanz, "Viseco: an annotated security management framework for 5g," In International Conference on Mobile, Secure, and Programmable Networking, Mohammedia, Morocco pp. 251-269, 2018. DOI: https://doi.org/10.1007/978-3-030-03101-5_21
F. Al-Turjman, "5g-enabled devices and smart-spaces in social-iot: an overview," Future Generation Computing System, vol. 92, pp. 732–744, 2019. DOI: https://doi.org/10.1016/j.future.2017.11.035
M. Agiwal, N. Saxena and A. Roy, "Towards connected living: 5g enabled internet of things (iot)," IETE Technical Review, vol. 36, no. 2, pp. 190-202, 2019. DOI: https://doi.org/10.1080/02564602.2018.1444516
S. Sharmeen, S. Huda, J.H. Abawajy, W.N. Ismail and M.M. Hassan, "Malware threats and detection for industrial mobile-iot networks," IEEE Access, vol. 6, pp. 15941–15957, 2018. DOI: https://doi.org/10.1109/ACCESS.2018.2815660
F. Jameel, M.A. Javed, D.N.K. Jayakody and S.A. Hassan, "On secrecy performance of industrial internet of things," Internet Technology Letters, vol. 1, no. 2 pp. 1-32, 2020. DOI: https://doi.org/10.1002/itl2.32
S. Mostafavi and W. Shafik, “Fog computing architectures, privacy and security solutions,” Journal of Communications Technology, Electronics and Computer Science, vol. 24, pp. 1–14, 2019.
W. Shafik, S. M. Matinkhah, M. N. Sanda, and F. Shokoor, “Internet of things-based energy efficiency optimization model in fog smart cities,” International Journal on Informatics Visualization, vol. 5, no. 2, pp. 105–112, 2021. DOI: https://doi.org/10.30630/joiv.5.2.373
W. Shafik and S. M. Matinkhah, “Unmanned aerial vehicles analysis to social networks performance,” CSI Journal on Computer Science and Engineering, vol. 18, no. 2, pp. 24-31, 2021.
F. Pan, Z. Pang, M. Luvisotto, M. Xiao and H. Wen, "Physical-layer security for industrial wireless control systems: basics and future directions," IEE Industrial. Electronic Magazine, vol. 12, no. 4, pp. 18–27, 2018. DOI: https://doi.org/10.1109/MIE.2018.2874385
C. Li, Z. Qin, E. Novak and Q. Li, "Securing sdn infrastructure of iot–fog networks from mitm attacks," IEEE Internet Things Journal, vol. 4, no. 5, pp. 1156–1164, 2017. DOI: https://doi.org/10.1109/JIOT.2017.2685596
W. Shafik, S. M. Matinkhah and S. "Dimensional fast machine learning algorithm for mobile unmanned aerial vehicle base stations," International Journal of Advances in Applied Sciences, 2252, no. 8814, pp. 8814, 2020.
M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating critical security issues of the iot world: present and future challenges," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018. DOI: https://doi.org/10.1109/JIOT.2017.2767291
J. Pacheco, D. Ibarra, A. Vijay and S. Hariri, "IoT security framework for smart water system," in IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, pp. 1285–1292, 2017. DOI: https://doi.org/10.1109/AICCSA.2017.85
S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury and E. Bertino, "Insecure connection bootstrapping in cellular networks," Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, Florida, pp. 1-11, 2019. DOI: https://doi.org/10.1145/3317549.3323402
C. Cremers and M. Dehnel-Wild, "Component-based formal analysis of 5G-AKA channel assumptions and session confusion," Network and Distributed System Security Symposium (NDSS), pp. 21-27, 2019. DOI: https://doi.org/10.14722/ndss.2019.23394
R. Borgaonkar, L. Hirschi, S. Park and A. Shaik, "New privacy threat on 3g, 4g, and upcoming 5g aka protocols," Proceeding on Privacy Enhancing Technology, vol. 2019, no. 3, pp. 108–127, 2019. DOI: https://doi.org/10.2478/popets-2019-0039
S. Behrad, E. Bertin and N. Crespi, "Securing authentication for mobile networks, a survey on 4G issues and 5G answers," in 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, pp. 1–8, 2018. DOI: https://doi.org/10.1109/ICIN.2018.8401619
J. Arkko, K. Norrman, M. Näslund and B. Sahlin, "A usim compatible 5g aka protocol with perfect forward secrecy," in IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 1205–1209, 2015. DOI: https://doi.org/10.1109/Trustcom.2015.506
A. Koutsos, "The 5g-aka authentication protocol privacy," in IEEE European Symposium on Security and Privacy (EuroS P), Stockholm, Sweden, pp. 464–479, 2019. DOI: https://doi.org/10.1109/EuroSP.2019.00041
L. Wang, J. Liu, M. Chen, G. Gui and H. Sari, "Optimization-based access assignment scheme for physical-layer security in d2d communications underlying a cellular network," IEEE Transaction Vehicular Technology, vol. 67, no. 7, pp. 5766–5777, 2018. DOI: https://doi.org/10.1109/TVT.2017.2789022
M.A. Rahman and E. Al-Shaer, "Automated synthesis of distributed network access controls: a formal framework with refinement," IEEE Transaction Parallel Distributed System, vol. 28, no. 2, pp. 416–430, 2017.
M. Khan, P. Ginzboorg, K. Jarvinen and V. Niemi, "Defeating the downgrade attack on identity privacy in 5g," In International Conference on Research in Security Standardisation, Darmstadt, vol. 11322, pp. 95-119, 2018. DOI: https://doi.org/10.1007/978-3-030-04762-7_6
D. He, S. Chan and M. Guizani, "Accountable and privacy-enhanced access control in wireless sensor networks," IEEE Transaction. Wireless Communication, vol. 14, no. 1, pp. 389–398, 2015. DOI: https://doi.org/10.1109/TWC.2014.2347311
S. Chatterjee, "On the design of fine grained access control with user authentication scheme for telecare medicine information systems," IEEE Access, vol. 5, pp. 7012–7030, 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2694044
Q. Huang, Y. Yang and L. Wang, "Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things," IEEE Access, vol. 5, pp. 12941–12950, 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2727054
H. Qinlong, M. Zhaofeng, Y. Yixian, N. Xinxin and F. Jingyi, "Improving security and efciency for encrypted data sharing in online social networks," China Communication, vol. 11, no. 3, pp. 104–117, 2014. DOI: https://doi.org/10.1109/CC.2014.6825263
P.P. Sriram, H.C. Wang, H. G. Jami and K. Srinivasan, "5g security: concepts and challenges," in 5G Enabled Secure Wireless Networks, Springer International Publishing, pp. 1–43, 2019. DOI: https://doi.org/10.1007/978-3-030-03508-2_1
J. Yao, Z. Han, M. Sohail and L. Wang, "A robust security architecture for sdn-based 5g networks," Future Internet, vol. 11, no. 4, 2019. DOI: https://doi.org/10.3390/fi11040085
M. Liyanage, A.B. Abro, M. Ylianttila and A. Gurtov, "Opportunities and challenges of software-defined mobile networks in network security," IEEE Security and Privacy, vol. 14, no. 4, pp. 34–44, 2016. DOI: https://doi.org/10.1109/MSP.2016.82
M.C. Dacier, H. König, R. Cwalinski, F. Kargl and S. Dietrich, "Security challenges and opportunities of software-defined networking," IEEE Security and Privacy, vol. 15, no. 2, pp. 96–100, 2017. DOI: https://doi.org/10.1109/MSP.2017.46
A. R. Prasad, "3gpp 5g security," Journal of ICT Standardization, vol. 6, no. 2, pp. 137-158, 2018. DOI: https://doi.org/10.13052/jicts2245-800X.619
R. P. Jover and V. Marojevic, "Security and protocol exploit analysis of the 5g specifications," IEEE Access, vol. 7, pp. 24956–24963, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2899254
V. Saraswat, R.A. Sahu, G. Sharma, V. Kuchta and O. Markowitch, "Public-key encryption with integrated keyword search," Journal of Hardware System and Security, vol. 3, no. 1, pp. 12–25, 2019. DOI: https://doi.org/10.1007/s41635-019-00066-w
C. Li and B. Palanisamy, "Privacy in internet of things: from principles to technologies," IEEE Internet Things Journal, vol. 6, no. 1, pp. 488–505, 2019. DOI: https://doi.org/10.1109/JIOT.2018.2864168
K. Yan, W. Shen, Q. Jin and H. Lu, "Emerging privacy issues and solutions in cyber-enabled sharing services: from multiple perspectives," IEEE Access, vol. 7, pp. 26031–26059, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2894344
P.F. Scott, "Secrecy and surveillance: lessons from the law of imsi catchers," International Review of Law, Computers and Technology, vol. 33, no. 3, pp. 349-371, 2019. DOI: https://doi.org/10.1080/13600869.2019.1569872
A. Braeken, M. Liyanage, P. Kumar and J. Murphy, "Novel 5g authentication protocol to improve the resistance against active attacks and malicious serving networks," IEEE Journals & Magazine, vol. 7, pp. 64040 - 64052, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2914941
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.