LATEST ADVANCES ON SECURITY ARCHITECTURE FOR 5G TECHNOLOGY AND SERVICES

Authors

  • K. O. Shobowale Department of Mechatronics Engineering, Airforce instittue of Technology Kaduna, Mando, Kaduna, Nigeria
  • Z. Mukhtar Department of Computer Engineeering, Ahmadu Bello University, Zaria, 14330, Kaduna, Nigeria.
  • B. Yahaya Department of Computer Engineeering, Ahmadu Bello University, Zaria, 14330, Kaduna, Nigeria.
  • Y. Ibrahim Department of Computer Engineeering, Ahmadu Bello University, Zaria, 14330, Kaduna, Nigeria.
  • M.O. Momoh Department of Mechatronics Engineering, Airforce instittue of Technology Kaduna, Mando, Kaduna, Nigeria

DOI:

https://doi.org/10.15282/ijsecs.9.1.2023.3.0107

Keywords:

5G Security, 5G Technology, 5G Mitigation, 5G Network Treat, 5G Architecture

Abstract

The roll out of the deployment of the 5G technology has been ongoing globally. The
deployment of the technologies associated with 5G has seen mixed reaction as regards its
prospects to improve communication services in all spares of life amid its security concerns. The
security concerns of 5G network lies in its architecture and other technologies that optimize the
performance of its architecture. There are many fractions of 5G security architecture in the
literature, a holistic security architectural structure will go a long way in tackling the security
challenges. In this paper, the review of the security challenges of the 5G technology based on its
architecture is presented along with their proposed solutions. This review was carried out with
some keywords relating to 5G securities and architecture; this was used to retrieve appropriate
literature for fitness of purpose. The 5G security architectures are mojorly centered around the
seven network security layers; thereby making each of the layers a source of security concern on
the 5G network. Many of the 5G security challenges are related to authentication and authorization
such as denial-of-service attacks, man in the middle attack and eavesdropping. Different methods
both hardware (Unmanned Aerial Vehicles, field programmable logic arrays) and software (Artificial
intelligence, Machine learning, Blockchain, Statistical Process Control) has been proposed for
mitigating the threats. Other technologies applicable to 5G security concerns includes: Multi-radio
access technology, smart-grid network and light fidelity. The implementation of these solutions
should be reviewed on a timely basis because of the dynamic nature of threats which will greatly
reduce the occurrence of security attacks on the 5G network.

References

The impact of 5G: Creating new value across industries and society (2020, January). Retrieved February 5, 2022, from:

https://wwww.weforum.org/whitepapers.

A.S. Abdalla, K. Powell, V. Marojevic and G. Geraci, "UAV-assisted attack prevention, detection, and recovery of 5G Networks," IEEE

wireless comm., 2020.

C. Benzaid and T. Taleb, "AI for beyond 5G Networks: a cyber-secuirty Defense or offence Enabler," IEEE network, 2020.

M.C. Chow and M. Ma, "A blockchain- enabled 5G authentication scheme against DoS Attacks,” Journal of Physics: Conf. Series,

M. Humayun, B. Hamid, N. Jhanjhi, G. Suseendran and M. N. Talib., "5G Network Security Issues, Challenges, Opportunities and

Future Directions: A Survey," Journal of Physics: Conf. Series, 2021.

M. Z. Noohani and K. U. Magsi, "A Review of 5G Technology: Architecture, Security and wide Applications," Int Research Journal

of Eng. and Tech., vol. 7, no. 5, 2020.

X. Jiang, "Digital economy in the post-pandemic era," Journal Of Chinese Economic and Business Studies, vol. 18, no. 4, p. 333–339,

R. Zhang, W. Zhou and H. Hu, "Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication,”

Hindawi Security and Comm. Networks, 2021.

P. P. Sriram, H.-C. Wang, H. G. Jami and K. Srinivasan, "5G Security: Concepts and Challenges,” Springer Nature Switzerland," 2019.

M. Liyanage, I. Ahmad, A. B. Abro and A. G. a. M. Ylianttila., "A comprehensive guide to 5G Security," John Wiley and Sons, 2018.

S. Yan, D. Yin, X. Song, X. Dong, G. Manogaran and G. Mastorakis, "Security situation assessment for massive MIMO systems for

G Communications,” Future Generation Comp. Sys," p. 25–34, 2019.

G. Mantas, N. Komninos, J. Rodriuez, E. Logota, H. and Marques, (2015). “Security for 5G Communications,” In: Rodriguez, J. (Ed.),

Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.

M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos and H. Janicke, "Security for 4G and 5G cellular networks: A survey of existing

authentication and privacy-preserving schemes," Journal of Network and Comp. Applications, pp. 55-82, 2018.

G. Arfaoui et. al, "A Security Architecture for 5G Networks," IEEE Access, 2018.

A. Dutta and E. Hammad., "5G Security Challenges and Opportunities: A system approach," IEEE Xplore, 2020.

J. H. Park, S. Rathore, S. K. Singh, M. M. Salim, A. E. Azzaoui, T. W. Kim, Y. Pan and J. H. Par, "A Comprehensive Survey on Core

Technologies and Services for 5G Security: Taxonomies, Issues, and Solutions,” Human-centric computing and info. sci, 2021.

D. Xu, P. Ren, Q. Du, L. Sun and Y. Wang, "Towards win-win: weighted-voronoi-diagram based channel quantization for security

enhancement in downlink cloud-ran with limited csi feedback," Sci. China Inf. Sci., 2017.

I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov "5G Security: Analysis of Threats and Solution " 2017 IEEE

Conference on Standards for Communications and Networking (CSCN)

M. F. Hossain, A. U. Mahin, T. Debnath, F. B. Mosharrof and K. Z. Islam., "Recent research in cloud radio access network (C-RAN)

for 5G cellular systems - A survey,” Journal of Network and Computer Applications, p. 31–48, 2019.

Y. Sun, Z. Tian, M. Li, C. Zhu, N. Guizani, "Automated attack and defence framework towards 5G security," IEEE Network , 2020.

S. Sullivan, A. Brighente, S. A. P. Kumar, and M. Conti, “5G Security Challenges and Solutions:A Review by OSI Layers” IEEE

Access, vol. 9, 2021.

J. Cao, M. Ma, H. Li, R. Ma, Y. Sun, P. Yu and Lihui Xiong, "A Survey on Security Aspects for 3GPP 5G Networks," IEEE Comms

Surveys & Tutorials, 2019.

S. Sicari, A. Rizzardi and A. Coen-Porisini, "5G In the internet of things era: An overview on security and privacy challenges,”

Computer Networks,179, 2020.

H. Yang, Z. H. J. Zhang, Y. Wu, Y. Lee and Y. Ji, "Blockchain-based trusted quthentication in cloud radio over fiber network for 5G,"

international conference on optical communications and networks (ICON), pp. 1-3, 2017.

J. Wu, Z. Zhang, Y. Hong, Y. Wen "Cloud radio access network (C-RAN): a primer.," IEEE Network, vol. 29, no. 1, p. 35–41, 2015.

I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, M. Ylianttila, IEEE Comms. Surveys & Tutorial, 2019

M.M. Saeed, M.K. Hasan, A.J. Obaid, R.A. Saeed, R.A. Mokhtar, E.S. Ali, Md Akhtaruzzaman, S. Amanlou, A.K.M. Zakir Hossain,

“A comprehensive review on the users’ identity privacy for 5G networks,” IET Communications, 2021.

Z. Lv, A. K. Singh and JinhuaLi, " Deep Learning for Security Problems in 5G Heterogeneous Networks," IEEE Network, 2021.

F. Al-Turjman, "Intelligence and security in big 5G-oriented IoNT: An overview”, Future Generation Computer Systems, p. 357–368,

J. Yao, Z. Han, M. Sohail and Liangmin Wang, " A Robust Security Architecture for SDN-Based 5G Networks,” Future Internet,

C. J. Mitchell, "The impact of quantum computing on real-world security: A 5G case study," Computers & Security, p. 93, 2020.

V. Chamola, S. Patra, N. Kumar, and M. Guisani, “FPGA for Re-configurable Hardware for Next Generation Communication, ” IEEE

Wireless Comms., 2020.

Y. Liu, J. Peng, J. Kang, A. M. Iliyasu, D. Niyato and A. A. A. El-Latif, "A Secure Federated Learning Framework for 5G Networks,"

IEEE Wireless Comms, 2020.

Z. Lv, A. K. Singh and JinhuaLi, "Deep Learning for Security Problems in 5G Heterogeneous Networks," IEEE Network, 2021.

J. O. Ramon et al., “INSPIRE-5Gplus: Intelligent Security and Pervasive Trust for 5G and Beyond Networks” ARES 2020, August 25–

, 2020, Virtual Event, Ireland

S. Y. Mehr and B. Ramamurthy, " An SVM based DDoS attack detection method for Ryu SDN controller," Proceedings of the 15th

Int. Conf. on emerging networking experiments and technologies, 2019.

L. Tan, Y. Pan, J. Wu, J. Zhou, H. Jiang and Y. Deng., "A new framework for DDos attack detection and defence in SDN environment.,"

IEEE Access 8, 2020.

J.D. Gadze, J.O. Agyemang, A.A. Banfo-Asante, H. Nunoo-Mensah and K. A-B. Opare, “An investigation into the application of

Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers,” Technologies, vol. 9, no. 14, 2012

R. Dangi, A. Jadhav, G. Choudhary, N. Dragoni, M.K. Mishra and P. Lalwani “ML-Based 5G Network Slicing Security: A

Comprehensive Survey” Future Internet, vol. 14, no. 116, 2022.

A.Y. Ding, “MEC and Cloud Security,” Wiley 5G Ref, p. 1–16, 2020.

J. Singh, I. Wounganag, S.K. Dhurandher, K. Khalid “A jamming attack detection technique for opportunistic network” Internet of

Things, vol. 17, 2022.

P. Panaweera, A. Jarcut, M. Liyanage “ MEC- enabled 5G use cases: A survey on security vunerabilities and countermeasures” ACM

Computing Surveys, vol. 54, no. 9, 2021.

H. Haas “ LiFi is a paradigm-shifting 5G technology” Reviews in Physics, vol 3, p. 26–31, 2018.

G. Albert, G. Dekel, S. Kurland, M. Ran, D. Malka, G. Katz, “Which LiFi’s apps may fit mostly to 5G and beyond- 5G Technology?,”

Global LIFI Congress (GLC).

K. Gai, M. Qiu, L. Tao, Y. Zhu, “Intrusion detection techniques for mobile cloud computing in heterogenous 5G” Security Comm.

Networks, vol. 9, p. 3049-3058, 2016.

H. Kim “5G core network security issues and attack classification from network protocol perspective” Journal of Internet Services

and Information Security (JISIS), vol 10, no. 2, p. 1-15, 2020.

A. Afaq, N. Haider, M.Z. Baig, K.S. Khan, M. Imran, I. Razzak “Machine learning for 5G security: Architecture, recent advances,

and challenges” Ad Hoc Networks, 123, 2021.

R. Gupta, A. Kumari, and S. Tanwar, “Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G

communications,” Transactions on Emerging Telecomms Technologies, 2020.

I. H. Abdulqadder, S. Zhou, D. Zou, I. T. Aziz, S. M. A. Akber, “Multi-layered Intrusion Detection and Prevention in the SDN/NFV

Enabled Cloud of 5G Networks using AI-based Defense Mechanisms,” Computer Networks, 2020

O. Hireche, C. Benzaïd,T. Taleb “Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G,” Computer

Networks 203, 2022.

M. Usama, I. Ilahi, J. Qadir, R. N. Mitra and M. K. Marina, “Examining Machine Learning for 5G and Beyond Through an Adversarial

Lens,” IEEE Internet Computing, vol. 25, no. 2, p. 26–34, 2021.

L. Sun, K. Tourki, Y. Hou, L. Wei “Safeguarding 5G Networks through Physical Layer Security Technologies”, Wireless Comms.

and Mobile Computing, 2018.

S. Köksal, Y. Dalveren, B. Maiga, and A. Kara, “Distributed denial‐of‐service attack mitigation in network functions virtualization‐

based 5G networks using management and orchestration” Int. Journal of Comm. Sys, vol. 34, no 9, 2021.

D. Fang, Y. Qian, and R. Q. Hu “Security for 5G Mobile Wireless Networks” IEEE Access, 2017

H. Yi, “Improving security of 5G networks with multiplicative masking method for LDPC codes,” Comps and Electrical Engrg, 95,

F. Liu, L. Su, B. Yang, H. Du, M. Qi, and S. He, “Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems,”

Int. Wireless Comms and Mobile Computing Conf (IWCMC).

Published

2023-01-03

How to Cite

Shobowale, K. O., Mukhtar, Z., Yahaya, B., Ibrahim, Y., & Momoh, M. (2023). LATEST ADVANCES ON SECURITY ARCHITECTURE FOR 5G TECHNOLOGY AND SERVICES. International Journal of Software Engineering and Computer Systems, 9(1), 27–38. https://doi.org/10.15282/ijsecs.9.1.2023.3.0107