Abstract
The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as future generations (XG) in this paper. In brief, this paper highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
Original language | English |
---|---|
Pages (from-to) | 3682-3722 |
Journal | IEEE Communications Surveys and Tutorials |
Volume | 21 |
Issue number | 4 |
DOIs | |
Publication status | Published - 10 May 2019 |
MoE publication type | A1 Journal article-refereed |
Funding
This work was supported by the Academy of Finland through Project 6Genesis Flagship under Grant 318927, through Project MEC-AI, through Project Industrial Edge, and through Project SecureConnect. The work of I. Ahmad was supported by the Jorma Ollila Grant. The work of A. Gurtov was supported by the Center for Industrial Information Technology.
Keywords
- 5G mobile communication
- wireless network
- authentication
- protocols
- cloud computing