Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap

被引:33
|
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [2 ]
Shetty, Sachin [3 ]
Gope, Prosanta [4 ]
Rodrigues, Joel J. P. C. [5 ,6 ]
机构
[1] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Dept Computat Modeling & Simulat Engn, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[4] Univ Sheffield, Dept Comp Sci, Sheffield S10 2TN, S Yorkshire, England
[5] Fed Univ Piaui UFPI, PPGEE, BR-64049550 Teresina, Brazil
[6] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Security; Internet of Things; 5G mobile communication; Protocols; Privacy; Analytical models; Solid modeling; Fifth generation mobile communication systems (5G); Internet of Things (IoT); security; privacy; key management; authentication; access control; intrusion detection; USER AUTHENTICATION SCHEME; KEY MANAGEMENT PROTOCOL; INTRUSION DETECTION SYSTEM; WIRELESS SENSOR NETWORKS; ACCESS-CONTROL; MALWARE DETECTION; AGREEMENT SCHEME; CLOUD; EFFICIENT; 5G;
D O I
10.1109/ACCESS.2020.3047895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work.
引用
收藏
页码:4466 / 4489
页数:24
相关论文
共 50 条
  • [1] Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
    Shubhani Aggarwal
    Neeraj Kumar
    [J]. Mobile Networks and Applications, 2023, 28 : 690 - 717
  • [2] Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
    Aggarwal, Shubhani
    Kumar, Neeraj
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 690 - 717
  • [3] Toward a Secure 5G-Enabled Internet of Things: A Survey on Requirements, Privacy, Security, Challenges, and Opportunities
    Ahmed, Shams Forruque
    Bin Alam, Md. Sakib
    Afrin, Shaila
    Rafa, Sabiha Jannat
    Taher, Samanta Binte
    Kabir, Maliha
    Muyeen, S. M.
    Gandomi, Amir H.
    [J]. IEEE ACCESS, 2024, 12 : 13125 - 13145
  • [4] Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions
    Dwivedi, Ashutosh Dhar
    Singh, Rajani
    Kaushik, Keshav
    Mukkamala, Raghava Rao
    Alnumay, Waleed S.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [5] Editorial: 5G-Enabled Internet of Things, applications and services
    Curado, Marilia
    Tanganelli, Giacomo
    Loureiro, Antonio A. F.
    Tsiropoulou, Eirini Eleni
    [J]. COMPUTER NETWORKS, 2020, 174
  • [6] A roadmap for security challenges in the Internet of Things
    Sfar, Arbia Riahi
    Natalizio, Enrico
    Challal, Yacine
    Chtourou, Zied
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) : 118 - 137
  • [7] A roadmap for security challenges in the Internet of Things
    Arbia Riahi Sfar
    Enrico Natalizio
    Yacine Challal
    Zied Chtourou
    [J]. Digital Communications and Networks, 2018, 4 (02) : 118 - 137
  • [8] Transfer Learning for Disruptive 5G-Enabled Industrial Internet of Things
    Coutinho, Rodolfo W. L.
    Boukerche, Azzedine
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 4000 - 4007
  • [9] Security and Privacy Challenges in 5G-Enabled Vehicular Networks
    Lai, Chengzhe
    Lu, Rongxing
    Zheng, Dong
    Shen, Xuemin Sherman
    [J]. IEEE NETWORK, 2020, 34 (02): : 37 - 45
  • [10] 5G-Enabled Tactile Internet
    Simsek, Meryem
    Aijaz, Adnan
    Dohler, Mischa
    Sachs, Joachim
    Fettweis, Gerhard
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (03) : 460 - 473