Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey

被引:1
|
作者
Sobrinho, Alvaro [1 ]
Vilarim, Matheus [2 ]
Barbosa, Amanda [2 ]
Gurjao, Edmar candeia [2 ]
Santos, Danilo F. S. [3 ]
Valadares, Dalton [2 ]
DA Silva, Leandro dias [4 ]
机构
[1] Fed Univ Agreste Pernambuco, Ctr Technol Innovat & Entrepreneurship, Garanhuns, Brazil
[2] Univ Fed Campina Grande, Campina Grande, Brazil
[3] Univ Fed Campina Grande, VIRTUS, Campina Grande, Brazil
[4] Univ Fed Alagoas, Comp Inst, Maceio, Brazil
关键词
5G; security; privacy; vertical applications; CONTAMINATION ATTACK DETECTION; 5G NETWORKS; D2D COMMUNICATIONS; DDOS ATTACKS; SMART CITIES; PRIVACY; AUTHENTICATION; COMMUNICATION; EFFICIENT; HEALTH;
D O I
10.1145/3696446
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication systems and previous generations is crucial. These systems must prioritize maintaining the confidentiality, integrity, and availability of services and data. Examples of vertical applications include smart cities, smart transportation, public services, Industry 4.0, smart grids, smart health, and smart agriculture. Each vertical application has specific security requirements and faces unique threats within the mobile network environment. Thus, it is essential to implement comprehensive and robust security measures. This approach helps minimize the attack surface and effectively manage risks. This survey thoroughly examines mobile networks and their security challenges in vertical applications, shedding light on associated threats and potential solutions. Our study considers the interplay between security considerations in 5G, legacy networks, and vertical applications. We emphasize the challenges, opportunities, and promising directions for future research in this field and the importance of securing vertical applications in the evolving landscape of mobile technology.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Opportunities and Challenges of Software-Defined Mobile Networks in Network Security
    Liyanage, Madhusanka
    Abro, Ahmed Bux
    Ylianttila, Mika
    Gurtov, Andrei
    IEEE SECURITY & PRIVACY, 2016, 14 (04) : 34 - 44
  • [2] Challenges and opportunities in biometric security: A survey
    Arora, Shefali
    Bhatia, M. P. S.
    INFORMATION SECURITY JOURNAL, 2022, 31 (01): : 28 - 48
  • [3] A survey of DeFi security: Challenges and opportunities
    Li, Wenkai
    Bu, Jiuyang
    Li, Xiaoqi
    Peng, Hongli
    Niu, Yuanzheng
    Zhang, Yuqing
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 10378 - 10404
  • [4] A survey on security issues and challenges in mobile Ad-hoc network
    Keerthana G.
    Anandan P.
    2018, European Alliance for Innovation (05)
  • [5] Research Challenges and Opportunities in Mobile Applications
    Hakkani-Tuer, Dilek
    Tur, Gokhan
    Heck, Larry
    IEEE SIGNAL PROCESSING MAGAZINE, 2011, 28 (04) : 108 - 110
  • [6] A Survey of Deep Learning on Mobile Devices: Applications, Optimizations, Challenges, and Research Opportunities
    Zhao, Tianming
    Xie, Yucheng
    Wang, Yan
    Cheng, Jerry
    Guo, Xiaonan
    Hu, Bin
    Chen, Yingying
    PROCEEDINGS OF THE IEEE, 2022, 110 (03) : 334 - 354
  • [7] Mobile RFID applications and security challenges
    Konidala, Divyan M.
    Kim, Kwangjo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 194 - +
  • [8] A Survey of Green Mobile Networks: Opportunities and Challenges
    Wang, Xiaofei
    Vasilakos, Athanasios V.
    Chen, Min
    Liu, Yunhao
    Kwon, Ted Taekyoung
    MOBILE NETWORKS & APPLICATIONS, 2012, 17 (01): : 4 - 20
  • [9] A Survey of Green Mobile Networks: Opportunities and Challenges
    Xiaofei Wang
    Athanasios V. Vasilakos
    Min Chen
    Yunhao Liu
    Ted Taekyoung Kwon
    Mobile Networks and Applications, 2012, 17 : 4 - 20
  • [10] Multimedia Applications and Security in MapReduce: Opportunities and Challenges
    Yu, Zhiwei
    Wang, Chaokun
    Thomborson, Clark
    Wang, Jianmin
    Lian, Shiguo
    Vasilakos, Athanasios V.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2083 - 2101