Security Challenges in 5G and IoT Networks: A Review

G. Edwin Prem Kumar, M. Lydia, Yoash Levron

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

5G networks are poised to satisfy the anticipated growth in Internet of Technology (IoT) devices and their related systems. The invasion of 5G networks brings along with it an accelerated need for security and privacy. The need for tailor-made security solutions has become the need of the hour to ensure data integrity, confidentiality, and authentication in 5G-based IoT networks. Since IoT initiates sensors and actuators in a totally smart environment, IoT security will involve protecting the total deployment architecture of IoT from internal and external attacks. Integration of cryptographical algorithms and quantum cryptography has been used effectively to secure data in 5G networks. Privacy and identity management has been a mandatory requirement in networks carrying delicate data involved in retail shops, traffic services, and health monitoring systems. Securing data in 5G and IoT networks and detection of trustworthy and rogue nodes, proper monitoring, logging, and broadcasting are the vital necessities of any security system. The exhaustive survey on the security issues in the 5G-IoT scenario, highlights the application of the latest technologies, incorporation of hybrid methodologies in securing them, and also emphasizes on the open issues yet to be addressed and research challenges that are to be explored.

Original languageEnglish
Title of host publicationEAI/Springer Innovations in Communication and Computing
Pages1-13
Number of pages13
DOIs
StatePublished - 29 Oct 2021

Publication series

NameEAI/Springer Innovations in Communication and Computing
ISSN (Print)2522-8595
ISSN (Electronic)2522-8609

Keywords

  • 5G networks
  • Access control
  • Adaptive security
  • Artificial intelligences
  • Authentication
  • Bigdata
  • Blockchain
  • Cryptographic
  • Deep learning
  • Internet of Things
  • Machine learning
  • Monitoring
  • Security
  • Software defined network
  • Unmanned aerial vehicles
  • Vehicular ad-hoc networks
  • Virtualization

ASJC Scopus subject areas

  • Information Systems
  • Health Informatics
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Security Challenges in 5G and IoT Networks: A Review'. Together they form a unique fingerprint.

Cite this