5G Security Threat Landscape, AI and Blockchain

被引:0
|
作者
Mohammad N. Alanazi
机构
[1] Al-Imam Mohammad Ibn Saud Islamic University (IMSIU),College of Computer and Information Sciences
来源
关键词
5G; IoT; Security; Artificial intelligence; Machine learning; Blockchain;
D O I
暂无
中图分类号
学科分类号
摘要
The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitigate emerging threats. This paper provides an exhaustive exploration of the 5G Security Threat Landscape investigating the intricacies of security challenges while harnessing innovative solutions to protect the IoT ecosystem. The study comprehensively unravels the diversity of security requirements, including critical aspects such as authentication, encryption, network slicing, and security by design, threat detection, and collaborative frameworks. By elucidating these foundational pillars, the paper highlights the interconnection between security paradigms and technological advancements, under scoring the pivotal role played by Artificial Intelligence (AI), Machine Learning (ML), and blockchain technologies in enhancing security measures. Through an integration of interdisciplinary research, the study emphasizes the imperative of synchronizing collective efforts among stakeholders to mitigate vulnerabilities and facilitate a secure IoT environment within the dynamic 5G landscape. As the technological landscape evolves, this research contributes to the ongoing research of securing the digital infrastructures, at par with researchers, practitioners, and policymakers, as they collectively set up a secure and resilient cyberspace.
引用
收藏
页码:1467 / 1482
页数:15
相关论文
共 50 条
  • [1] 5G Security Threat Landscape, AI and Blockchain
    Alanazi, Mohammad N.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (03) : 1467 - 1482
  • [2] Blockchain and AI for Beyond 5G Networks
    Wang, Stephen
    Zhang, Yan
    Wang, Kun
    Moustafa, Hassnaa
    Zhang, Ke
    IEEE NETWORK, 2020, 34 (06): : 22 - 23
  • [3] Security Threat Analysis of the 5G ESSENCE Platform
    Chochliouros, Ioannis P.
    Spiliopoulou, Anastasia S.
    Kostopoulos, Alexandros
    Kourtis, Michail-Alexandros
    Lazaridis, Pavlos I.
    Zaharis, Zaharias D.
    Prasad, Neeli R.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (03) : 2409 - 2426
  • [4] 5G Security Threat Assessment in Real Networks
    Park, Seongmin
    Kim, Daeun
    Park, Youngkwon
    Cho, Hyungjin
    Kim, Dowon
    Kwon, Sungmoon
    SENSORS, 2021, 21 (16)
  • [5] Security Threat Analysis of the 5G ESSENCE Platform
    Ioannis P. Chochliouros
    Anastasia S. Spiliopoulou
    Alexandros Kostopoulos
    Michail-Alexandros Kourtis
    Pavlos I. Lazaridis
    Zaharias D. Zaharis
    Neeli R. Prasad
    Wireless Personal Communications, 2021, 120 : 2409 - 2426
  • [6] Block5GIntell: Blockchain for AI-Enabled 5G Networks
    El Azzaoui, Abir
    Singh, Sushil Kumar
    Pan, Yi
    Park, Jong Hyuk
    IEEE ACCESS, 2020, 8 : 145918 - 145935
  • [7] From 5G to 6G: Technologies, Architecture, AI, and Security
    Mitra, Rupendra Nath
    Rong, Bo
    Yarali, Abdulrahman
    IEEE WIRELESS COMMUNICATIONS, 2023, 30 (06) : 6 - 6
  • [8] Blockchain Enabled SDN Framework for Security Management in 5G Applications
    Das, Debashis
    Banerjee, Sourav
    Dasgupta, Kousik
    Chatterjee, Pushpita
    Ghosh, Uttam
    Biswas, Utpal
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 414 - 419
  • [9] Blockchain Enabled Federated Slicing for 5G Networks with AI Accelerated Optimization
    Hu, Qiwei
    Wang, Wei
    Bai, Xiang
    Jin, Shi
    Jiang, Tao
    IEEE NETWORK, 2020, 34 (06): : 46 - 52
  • [10] Guest Editorial: Blockchain and AI Enabled 5G Mobile Edge Computing
    Chang, Elizabeth
    Chan, Kit Yan
    Clark, Ponnie
    Potdar, Vidy
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7067 - 7069