TY - JOUR
T1 - Security for 5G and Beyond
AU - Ahmad, Ijaz
AU - Shahabuddin, Shahriar
AU - Kumar, Tanesh
AU - Okwuide, Jude
AU - Gurtov, Andrei
AU - Ylianttila, Mika
N1 - Funding Information:
Manuscript received August 23, 2018; revised January 25, 2019 and March 20, 2019; accepted April 28, 2019. Date of publication May 10, 2019; date of current version November 25, 2019. This work was supported by the Academy of Finland through Project 6Genesis Flagship under Grant 318927, through Project MEC-AI, through Project Industrial Edge, and through Project SecureConnect. The work of I. Ahmad was supported by the Jorma Ollila Grant. The work of A. Gurtov was supported by the Center for Industrial Information Technology. (Corresponding author: Ijaz Ahmad.) I. Ahmad is with the Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland, and also with the VTT Technical Research Centre of Finland, 02150 Espoo, Finland (e-mail: ijaz.ahmad@vtt.fi).
Publisher Copyright:
© 1998-2012 IEEE.
PY - 2019/5/10
Y1 - 2019/5/10
N2 - The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as future generations (XG) in this paper. In brief, this paper highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
AB - The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as future generations (XG) in this paper. In brief, this paper highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
KW - 5G mobile communication
KW - wireless network
KW - authentication
KW - protocols
KW - cloud computing
UR - http://www.scopus.com/inward/record.url?scp=85067552717&partnerID=8YFLogxK
U2 - 10.1109/COMST.2019.2916180
DO - 10.1109/COMST.2019.2916180
M3 - Article
SN - 1553-877X
VL - 21
SP - 3682
EP - 3722
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 4
ER -