Analytical review on secure communication protocols for 5G and IoT networks

被引:2
|
作者
Premalatha, J. [1 ]
Swamidason, Iwin Thanakumar Joseph [2 ]
Harshavardhanan, Pon [3 ]
Anandaraj, S. P. [4 ]
Jeyakrishnan, V [5 ]
机构
[1] Kongu Engn Coll, Dept Informat Technol, Erode 638052, Tamil Nadu, India
[2] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
[3] VIT Bhopal Univ, Sch CSE, Bhopal 466114, India
[4] Presidency Univ, Bengaluru 560064, India
[5] SAINTGITS Coll Engn, Dept Comp Sci & Engn, Kottayam, Kerala, India
关键词
authentication protocol; execution time; internet of things; IoT; privacy preservation; secure communication; PRIVACY-PRESERVING AUTHENTICATION; BLOCKCHAIN-BASED SECURE; KEY AGREEMENT PROTOCOL; LIGHTWEIGHT AUTHENTICATION; ROUTING ALGORITHM; UAV NETWORKS; INTERNET; EFFICIENT; DEVICES; AWARE;
D O I
10.1504/IJAHUC.2022.123527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) provides an exciting future for the interaction of devices utilising computing and sensorial capabilities. Among the existing technologies, fifth generation (5G) schemes are expected to be the motivating force for the realisation of IoT concept. This research paper reviews existing state-of-art on the secure communication for 5G and IoT networks. We have created a taxonomy and categorised the research works based on the protocols such as light weight authentication protocol, trust-aware routing protocol, service-oriented authentication protocol, and application-oriented protocol. The research gaps and the challenges faced for secure communication in 5G and IoT networks are listed for further enhancement in the security protocols. We further analysed the research work based on the classification methods, performance metrics, and the year of publication. Our analysis reveals that the most commonly used classification technique is trust-aware routing protocols, and the most frequently used performance metrics is execution time, the execution time of most of the research work lies between 10 ms to 300 ms, and the communication overhead ranges from 1 x 10(5) bits to 5 x 10(5) bits.
引用
收藏
页码:50 / 66
页数:17
相关论文
共 50 条
  • [1] A cybersecurity review in IoT 5G networks
    Narciandi-Rodriguez, Diego
    Aveleira-Mata, Jose
    Garcia-Ordas, Maria Teresa
    Alfonso-Cendon, Javier
    Benavides, Carmen
    Alaiz-Moreton, Hector
    INTERNET OF THINGS, 2025, 30
  • [2] Secure UAV Communication Networks over 5G
    Li, Bin
    Fei, Zesong
    Zhang, Yan
    Guizani, Mohsen
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 114 - 120
  • [3] A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks
    Usman, Muhammad
    Asghar, Muhammad Rizwan
    Ansari, Imran Shafique
    Granelli, Fabrizio
    Abbasi, Qammer H.
    Qaraqe, Khalid
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [4] Secure Chaos of 5G Wireless Communication System Based on IOT Applications
    ALRikabi, Haider TH. Salim
    Hazim, Hussein Tuama
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (12) : 89 - 105
  • [5] Routing constraints in the device-to-device communication for beyond IoT 5G networks: a review
    S. Malathy
    P. Jayarajan
    M. H. D. Nour Hindia
    Valmik Tilwari
    Kaharudin Dimyati
    Kamarul Ariffin Noordin
    I. S. Amiri
    Wireless Networks, 2021, 27 : 3207 - 3231
  • [6] Routing constraints in the device-to-device communication for beyond IoT 5G networks: a review
    Malathy, S.
    Jayarajan, P.
    Hindia, M. H. D. Nour
    Tilwari, Valmik
    Dimyati, Kaharudin
    Noordin, Kamarul Ariffin
    Amiri, I. S.
    WIRELESS NETWORKS, 2021, 27 (05) : 3207 - 3231
  • [7] Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
    Santos, Bernardo
    Dzogovic, Bruno
    Feng, Boning
    Van Thuan Do
    Jacot, Niels
    Thanh van Do
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 130 - 135
  • [8] A survey on secure communication techniques for 5G wireless heterogeneous networks
    Kakkar, Ajay
    INFORMATION FUSION, 2020, 62 : 89 - 109
  • [9] RFID secure application revocation for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Du, Zhao
    Li, Hui
    Yang, Yintang
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 175 - 181
  • [10] 5G as an Enabler for Secure IoT in the Smart Grid
    Borgaonkar, Ravishankar
    Jaatun, Martin Gilje
    2019 FIRST INTERNATIONAL CONFERENCE ON SOCIETAL AUTOMATION (SA), 2019,