Analytical review on secure communication protocols for 5G and IoT networks

被引:2
|
作者
Premalatha, J. [1 ]
Swamidason, Iwin Thanakumar Joseph [2 ]
Harshavardhanan, Pon [3 ]
Anandaraj, S. P. [4 ]
Jeyakrishnan, V [5 ]
机构
[1] Kongu Engn Coll, Dept Informat Technol, Erode 638052, Tamil Nadu, India
[2] Koneru Lakshmaiah Educ Fdn, Dept Comp Sci & Engn, Vaddeswaram, Andhra Pradesh, India
[3] VIT Bhopal Univ, Sch CSE, Bhopal 466114, India
[4] Presidency Univ, Bengaluru 560064, India
[5] SAINTGITS Coll Engn, Dept Comp Sci & Engn, Kottayam, Kerala, India
关键词
authentication protocol; execution time; internet of things; IoT; privacy preservation; secure communication; PRIVACY-PRESERVING AUTHENTICATION; BLOCKCHAIN-BASED SECURE; KEY AGREEMENT PROTOCOL; LIGHTWEIGHT AUTHENTICATION; ROUTING ALGORITHM; UAV NETWORKS; INTERNET; EFFICIENT; DEVICES; AWARE;
D O I
10.1504/IJAHUC.2022.123527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) provides an exciting future for the interaction of devices utilising computing and sensorial capabilities. Among the existing technologies, fifth generation (5G) schemes are expected to be the motivating force for the realisation of IoT concept. This research paper reviews existing state-of-art on the secure communication for 5G and IoT networks. We have created a taxonomy and categorised the research works based on the protocols such as light weight authentication protocol, trust-aware routing protocol, service-oriented authentication protocol, and application-oriented protocol. The research gaps and the challenges faced for secure communication in 5G and IoT networks are listed for further enhancement in the security protocols. We further analysed the research work based on the classification methods, performance metrics, and the year of publication. Our analysis reveals that the most commonly used classification technique is trust-aware routing protocols, and the most frequently used performance metrics is execution time, the execution time of most of the research work lies between 10 ms to 300 ms, and the communication overhead ranges from 1 x 10(5) bits to 5 x 10(5) bits.
引用
收藏
页码:50 / 66
页数:17
相关论文
共 50 条
  • [21] Architectures, Protocols and Algorithms for 5G Wireless Networks
    Ramón Agüero
    Bernd-Ludwig Wenning
    Yasir Zaki
    Andreas Timm-Giel
    Mobile Networks and Applications, 2018, 23 : 518 - 520
  • [22] Architectures, Protocols and Algorithms for 5G Wireless Networks
    Aguero, Ramon
    Wenning, Bernd-Ludwig
    Zaki, Yasir
    Timm-Giel, Andreas
    MOBILE NETWORKS & APPLICATIONS, 2018, 23 (03): : 518 - 520
  • [23] A Review Study on "5G NR Slicing Enhancing IoT & Smart Grid Communication"
    Faruque, M. A.
    2021 12TH INTERNATIONAL RENEWABLE ENGINEERING CONFERENCE (IREC 2021), 2021, : 363 - 366
  • [24] Secure Federated Learning in 5G Mobile Networks
    Isaksson, Martin
    Norrman, Karl
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [25] Optimization of Massive Connections in 5G Networks for IoT
    Zapata Cano, Pablo H.
    Ramirez-Arroyo, Alejandro
    Luna Valero, Francisco
    Valenzuela-Valdes, Antonio
    Castillo-Valdivieso, Pedro A.
    Valenzuela Valdes, Juan Fco.
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 581 - 585
  • [26] Challenges and Features of IoT Communications in 5G Networks
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Al-Sadi, Aisha
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 508 - 512
  • [27] Secure Open Fronthaul Interface for 5G Networks
    Cho, Joo Yeon
    Sergeev, Andrew
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [28] Techniques for smart and secure 5G softwarized networks
    Laurent Ciavaglia
    Prosper Chemouil
    Bruce Maggs
    Annals of Telecommunications, 2019, 74 : 543 - 544
  • [29] A SECURE FEDERATED LEARNING FRAMEWORK FOR 5G NETWORKS
    Liu, Yi
    Peng, Jialiang
    Kang, Jiawen
    Iliyasu, Abdullah M.
    Niyato, Dusit
    Abd El-Latif, Ahmed A.
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) : 24 - 31
  • [30] Techniques for smart and secure 5G softwarized networks
    Ciavaglia, Laurent
    Chemouil, Prosper
    Maggs, Bruce
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (9-10) : 543 - 544