A cybersecurity review in IoT 5G networks

被引:0
|
作者
Narciandi-Rodriguez, Diego [1 ]
Aveleira-Mata, Jose [2 ]
Garcia-Ordas, Maria Teresa [2 ]
Alfonso-Cendon, Javier [3 ]
Benavides, Carmen [2 ]
Alaiz-Moreton, Hector [1 ]
机构
[1] Univ Leon, RIASC Res Inst Appl Sci Cybersecur, MIC, Campus Vegazana S-N, Leon 24071, Spain
[2] Univ Leon, Escuela Ingn, SECOMUCI Res Grp, Dept Elect Syst & Automat Engn, Campus Vegazana s-n, Leon 24071, Spain
[3] Univ Leon, Escuela Ingn, Dept Mech Comp Sci & Aerosp Engn, Campus Vegazana S-N, Leon 24071, Spain
关键词
5G; IoT; Attacks; Cybersecurity; Networks; Vulnerabilities; SECURITY; INTERNET; THINGS; CHALLENGES; TRENDS; DDOS;
D O I
10.1016/j.iot.2024.101478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive review of cybersecurity in 5G-enabled Internet of Things (IoT) networks, a rapidly expanding field where data security is paramount due to the increasing connectivity and sensitivity of IoT applications. Building upon existing literature, including foundational technical documents and recent studies on 5G security, we explore the primary elements and threats within this ecosystem. Key concepts are examined, covering 5G networks, architecture, cybersecurity protocols, IoT, and standards developed by 3GPP to contextualize the complex interplay of technologies involved. Our study employs the PRISMA methodology, which allows for a systematic review of relevant sources across major research databases, providing a structured synthesis of recent advancements and persisting challenges. We delve into the state of the art, detailing prominent use cases and their associated vulnerabilities, which expose critical risks within both the 5G network elements and IoT endpoints. In particular, this review identifies and categorizes primary attack vectors, examining how the convergence of 5G and IoT introduces challenges to cybersecurity frameworks. This review also outlines limitations in current research, including gaps in standardized defense mechanisms and challenges in threat detection and response capabilities. Our findings underscore the importance of ongoing research into resilient security solutions tailored for 5G-IoT ecosystems, concluding with recommendations for future research directions to fortify this essential area of network security.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] IoT cybersecurity in 5G and beyond: a systematic literature review
    Pirbhulal, Sandeep
    Chockalingam, Sabarathinam
    Shukla, Ankur
    Abie, Habtamu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2827 - 2879
  • [2] Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation
    Nieto, Ana
    Acien, Antonio
    Fernandez, Gerardo
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 881 - 889
  • [3] Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation
    Ana Nieto
    Antonio Acien
    Gerardo Fernandez
    Mobile Networks and Applications, 2019, 24 : 881 - 889
  • [4] Analytical review on secure communication protocols for 5G and IoT networks
    Premalatha, J.
    Swamidason, Iwin Thanakumar Joseph
    Harshavardhanan, Pon
    Anandaraj, S. P.
    Jeyakrishnan, V
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 40 (1-3) : 50 - 66
  • [5] Statistical Model for IoT/5G Networks
    Baz, Abdullah
    Abu Al-Naja, Abbas
    Baz, M.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 109 - 111
  • [6] Optimization of Massive Connections in 5G Networks for IoT
    Zapata Cano, Pablo H.
    Ramirez-Arroyo, Alejandro
    Luna Valero, Francisco
    Valenzuela-Valdes, Antonio
    Castillo-Valdivieso, Pedro A.
    Valenzuela Valdes, Juan Fco.
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 581 - 585
  • [7] Challenges and Features of IoT Communications in 5G Networks
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Al-Sadi, Aisha
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 508 - 512
  • [8] Security Measures in IOT based 5G Networks
    Dey, A.
    Nandi, S.
    Sarkar, M.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 561 - 566
  • [9] 5G and IoT
    Chang, Li Fung
    2016 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2016,
  • [10] 5G and IoT
    Chang, Li Fung
    2016 INTERNATIONAL SYMPOSIUM ON VLSI TECHNOLOGY, SYSTEMS AND APPLICATION (VLSI-TSA), 2016,