Submit Search
Upload
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V11/i1/IRJET-V11I124.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf
4nm18is123SunidhiSir
Â
An analysis of the security needs
An analysis of the security needs
Christian Miranda Moreira
Â
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdf
Addison Coleman
Â
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
Â
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua
TatianaMajor22
Â
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
slametarrokhim1
Â
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
Â
Comprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
Â
Recommended
Security_for_5G_Mobile_Wireless_Networks (1).pdf
Security_for_5G_Mobile_Wireless_Networks (1).pdf
4nm18is123SunidhiSir
Â
An analysis of the security needs
An analysis of the security needs
Christian Miranda Moreira
Â
A REVIEW PAPER ON 5G NETWORK.pdf
A REVIEW PAPER ON 5G NETWORK.pdf
Addison Coleman
Â
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
Â
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua
TatianaMajor22
Â
Network Security Roadmap have some perception of provided security
Network Security Roadmap have some perception of provided security
slametarrokhim1
Â
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
PositiveTechnologies
Â
Comprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
Â
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
IRJET Journal
Â
7215nsa05
7215nsa05
Shivanand Manjaragi
Â
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Â
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
PhD Assistance
Â
4G Technology and Its Application – An Overview
4G Technology and Its Application – An Overview
paperpublications3
Â
Brief introduction-about-5 g-mobile-technologies
Brief introduction-about-5 g-mobile-technologies
ritusara
Â
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
SecurityGen1
Â
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
SecurityGen1
Â
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
Â
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
SecurityGen1
Â
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
Security Gen
Â
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
Security Gen
Â
L010517180
L010517180
IOSR Journals
Â
Fb34942946
Fb34942946
IJERA Editor
Â
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
Madhunath Yadav
Â
5G_Upload.docx
5G_Upload.docx
Sun Technologies
Â
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
EdisonAndresZapataOc
Â
Jamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
Â
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
shikhasony666
Â
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
More Related Content
Similar to SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
IRJET Journal
Â
7215nsa05
7215nsa05
Shivanand Manjaragi
Â
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
Â
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
PhD Assistance
Â
4G Technology and Its Application – An Overview
4G Technology and Its Application – An Overview
paperpublications3
Â
Brief introduction-about-5 g-mobile-technologies
Brief introduction-about-5 g-mobile-technologies
ritusara
Â
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
SecurityGen1
Â
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
SecurityGen1
Â
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
IRJET Journal
Â
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
SecurityGen1
Â
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
Security Gen
Â
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
Security Gen
Â
L010517180
L010517180
IOSR Journals
Â
Fb34942946
Fb34942946
IJERA Editor
Â
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
Madhunath Yadav
Â
5G_Upload.docx
5G_Upload.docx
Sun Technologies
Â
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
EdisonAndresZapataOc
Â
Jamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
Â
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
shikhasony666
Â
Similar to SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
(20)
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
A REVIEW ON QUALITY OF MONITORING FOR CELLULAR NETWORKS
Â
7215nsa05
7215nsa05
Â
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Â
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Â
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
Â
4G Technology and Its Application – An Overview
4G Technology and Its Application – An Overview
Â
Brief introduction-about-5 g-mobile-technologies
Brief introduction-about-5 g-mobile-technologies
Â
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Â
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
Â
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
Â
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Â
Securing the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
Â
Securing the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
Â
L010517180
L010517180
Â
Fb34942946
Fb34942946
Â
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
Â
5G_Upload.docx
5G_Upload.docx
Â
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...
Â
Jamming attacks in wireless networks
Jamming attacks in wireless networks
Â
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Â
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Â
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Â
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Â
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Â
Recently uploaded
(20)
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Â
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Â
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Â
Internship report on mechanical engineering
Internship report on mechanical engineering
Â
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Â
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Â
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Â
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Â
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Â
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Â
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Â
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 138 SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security Athira Krishna M P1, Anu Eldho2, Rini T Paul 3 1Student, Dept of Computer Science and Engineering, Mar Athanasius college of Engineering, Kerala,India 2Professor, Dept of computer science and Engineering, Mar Athanasius college of Engineering ,Kerala,India 3Professor, Dept of computer science and Engineering, Mar Athanasius college of Engineering ,Kerala,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - One crucial component of the deployment of 5G technology is 5G cellular network security. The way we use and engage with technology is about to undergo a radical change thanks to the fifth generation of mobile networks, which also presents new security problems and opportunities. Since 5G networks are expected to be more intricate and interconnected than those of previous generations, strongand all-encompassing security measures will be necessary to guarantee that confidential and safe sensitive data is transferred over the network from cyber-attacks. Itisthejoint responsibilityof networkoperators, devicemanufacturers, and service providers to ensure the security of 5G networks. Network administrators must enforce stringent security measures and make sure that security is incorporatedintothe network architecture from the beginning. It is the responsibility of device manufacturers to guaranteethattheir products are patched quickly, have the most recent security software and hardware, and are safe. In addition to putting policies in place to identify and handle security problems, service providers need to assume accountability for the security of the apps and services they provide. Key Words: D2D, SDN, HDNET 1.INTRODUCTION The existing 4G/International Mobile Telecommunications (IMT)-Advanced Systems are not as capable as the fifth generation (5G) of wireless systems, which represents a breakthrough in mobile wireless telecommunications. Beyond merely being a cellular network, 5G is an all- encompassing system with distinct features and objectives that unlock a multitude of service opportunities. One of the primary goals of 5G is to provide mobile broadband users with denser networks and higher bandwidth than 4G. The integration of massive machine-type communications and device-to-device (D2D) communications capabilities makes the network more flexible. Furthermore, 5G planning includes enhancements for Internet of Things (IoT) implementation, with a focus on low latency and low energy usage. The groundbreaking nature of 5G wireless systems is further demonstrated by its eight key characteristics: 100% coverage, an astounding 99.999% availability, 1000 times more bandwidth per unit area, ultra-fast (1–10 Gbps) connections to field endpoints, an astounding 1 millisecond latency, the ability to connect 10-100 times more devices, and up to 10 years of battery life for low-power devices. For 5G systems to meet these high-performance goals, a variety of cutting-edge technologies are used. Among these are network slicing, D2D communications, mm Wave, software- defined networks (SDN), heterogeneous networks(HetNet), massive multiple-input multiple-output (MIMO), and network functions virtualization (NFV). Despite these advancements, the standardization process for 5G wireless technology is still in its early stages. Security of wireless communications is a hot topic, and 5G offers unique prospects and difficulties in this field. Security features like secrecy, integrity, and authentication can be provided, although there are limitations due to the limited bandwidth of the broadcast format. Modern cellular networks provide security threats at the media access control layer (MAC)and physical layer (PHY) because of potential attacks, vulnerabilities, and privacy issues. Features like communication route protection, mutual authentication between the network and user equipment (UE), and user identity management are included in conventional security designs for voice and data security. One example of how legacy cellular networks provide a high degree of security and dependability is Long Term Evolution (LTE). Both encryption of user communication and mutual authentication between UEs and base stations are standard operations. However, because 5G has special qualities like low latency and excellent energy efficiency,therearefurther security concerns. This paper explores the quickly developing field of security protocols designed to satisfy 5G network specifications. It carefully looks at how different state-of-the-art technologies, such as device-to-device interactions, heterogeneous networks, software-defined networks (SDN), massive multiple-input multiple-output (MIMO), and the Internet of Things (IoT),activelycontribute to improving the overall securityframework of5Gnetworks. Examining these cutting-edge technologies highlights how 5G's security environment is dynamicandhowconventional methods might not be sufficient to handle the new threats that arise from this generation's unique characteristics. For example, the Internet of Things brings a variety of networked devices, therefore strong security measures are required to ensure the integrity of data transfer. Like this, software-defined networks offer new factors to ensure secure communication while also providing flexibility and programmability to network management. While they
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 139 further improve the 5G environment, massive MIMO, heterogeneous networks, and device-to-device interactions also pose new security challenges. To ensure the integrity and dependability of the upcoming wave of wireless networks, it is becoming more and more important to address and resolve these security vulnerabilities proactively as 5G networks continue to develop. To create a secure and robust 5G ecosystem, researchers, industry professionals, and technology developers must work together. They are vital to strengthening the foundations of 5G networks and guaranteeing that they not only meet but surpass the strict specifications for reliability and integrityinwirelesscommunicationsbyresearching and putting into practice cutting-edge security methods. In summary, the ever-changing landscape of 5G security necessitates constant innovation and adaptation, and stakeholder efforts working together are critical to effectively tackling these difficulties as they arise. 2. LITERATURE SURVEY The goal of the 5G cellular network security literaturereview is to thoroughly evaluate the current level of security in 5G networks, with a focus on identifyingand analyzing different security concerns as well as investigating suggested solutions. Vulnerabilities like eavesdropping and radio frequency interference are brought to light when examining the physical layer, which emphasizes how crucial it is to comprehend and protect against unauthorized access. A key componentof5G,networkslicingallowscustomizednetwork segments for a range of use cases. However, it also presents risks associatedwithmisconfigurationsandvulnerabilitiesin particular slices, whichcouldresultinillegalaccessorservice interruptions. The inclusion of edge computing in 5G increases the attack surface, so it is important to pay attention to making sure edge nodes and device-to-edge communication are secure. In addition, the evaluation explores the security implications of device-to-device (D2D) communication, acknowledging that while it can improve connection, there are risks associated with it as well that must be resolved to have a strong security framework in 5G networks. By doing so,theliteraturestudyhopestoshedlight on how 5G security is developing, provide a framework for comprehending and resolving present issues, and suggest workable solutions. Through their work, sung moon Kwon [1] validates session management techniques that verify a range of session management strategies. Broadening the focus,theliteratureanalysisincludesadetailedassessmentof security solutions that are obtainable over the 5G network and provides a thorough comparison of their functionality with other goods that are on the market. Through a detailed examination based on the NSS performance evaluation criteria, researchers provide insights into the efficacy and efficiency of these security measures. By comparing the performance to currently available goods, the comparison highlights the necessity of actual data to support any claims of superiority. When a new point is introduced, it is assumed that a new control group has been found, necessitating extra proof to support the claim that the control group's performance evaluation data is still up to date. Crucially, the assessment emphasizes that the suggested session management method can be used anywhere if the network complies with 5G SA (Standalone) requirements, proving its adaptability in a variety of settings. M Awais Javed [2]. This paperexplores several issuesrelated to the impending rollout of 5G networks, looking forward to theiruniqueandsophisticatedconnectioncharacteristicsthat are defined by automation, virtualization, and centralized resource management. To strengthen defenses against network-based jamming attacks, two significant security flaws—unprotected re-authenticated traffic and the vulnerability of commonly used wireless channels—are noted and must be addressed. Beyond these worries, the conversation also covers the use of specialized security features in 5G applications, such as Internet of Things (IoT), HetNet (Heterogeneous Networks), D2D (Device-to-Device communication), M-MIMO (MassiveMultiple-InputMultiple- Output), and SDN (Software-Defined Networking).Theessay is noteworthy for its in-depth examination of SDN's function in delivering autonomous security and centralized control within 5G ultra-dense networks (UDN). To overcome these issues, the essay emphasizes how strategically integrating SDN, NFV (Network Functions Virtualization), and cloud computing can provide flexibility, improved network security, and huge connectivity in the 5G ecosystem. Overall, the essay offers a thorough analysis of the most important security issues in the next 5G era and sheds light on viable fixes that make use of cutting-edge technologies to create a more robust and secure network infrastructure. Ke Xiao [3] With the upcoming release of 5G technology, there will be a greater focus on using high frequencies, specifically in the millimeter-wave (mm Wave) spectrum because of its significantly larger accessible bandwidth. The development and deployment of micro cell networks, which are essential to the architecture of 5G networks, depend on this focus on mm Wave frequencies. Nonetheless, there are numerous difficulties brought about by the quick development of millimeter-wave systems, especially regarding the safety of physical layer (PHY) protocols. The complexity of security issues in 5G millimeter-wave small cell network PHYs is explored in this paper, which also looks at several essential communication technologies like Non-Orthogonal Multiple Access (NOMA) and Multiple Input Multiple Output (MIMO). It seeks to provide insight on the unique security issues that arise in themillimeter-wavebandbyexaminingthesubtleties of these technologies. Creating a thorough grasp of the security environment via the lens of 5G millimeter-wave small cell communication technologies is one of the main goals of this investigation. The paper presents a Radio Tomography(RT)basedcommunicationchannelmodelusing numerical experiments, providing an accurate depiction of the 5G mm Wave small cell environment. The paper
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 140 demonstrates through these experiments how the secrecy capacity of the mm Wave band is strongly influenced by the richness of the Radio Frequency (RF) environment. Through its discussion of the security issues surrounding small cell networks and millimeter wave frequencies, the paper adds significant perspective to the current discussion on 5G technology security. Abdel-Malek et al [4] As previously indicated, this research focuses on resolving the security flaws related to the 5G Device-to-Device (D2D)ProximityServices(ProSe)standard. Since drones are among the most common InternetofThings (IoT) devices that are primed to take advantage of 5G services, the suggested solution has been painstakingly customized for this particular use case. However, it's important to understand thatthis architecturemightbeused in a wide range of different IoT devices in a variety of industries, such as medical and automotive networks. This study's fundamental premise is that, in a swarm of drones, only one drone is cellularly reachable and functions asa data relay. The other drones in theswarm thenlinkdirectlytothis designated leader drone using D2D. As a User Equipment (UE)-to-Network Relay in the described architecture, the leader drone plays a critical role in enabling communication between the other drones in the swarm and the 5G core network. Mutual authentication is implied by this complex configuration, guaranteeing a safe and reliable communication channel between the drone leader and the other drones. Drones were a logical choice for this research's main emphasis because of their popularity and extensiveuse in a variety of industries. This research expands the application of the 5G D2D ProSe standard to a wider range of IoT devicesbyprotectingthecommunicationchannelswithin a drone swarm. By emphasizing mutual authentication, the security posture is further strengthened and a reliable and strong communication environment is established between the leader drones and the linked devices. Essentially, this cooperative endeavor not only tackles security issues concerning drone communication, but also establishes the foundation for expanding these security protocols to a wide range of IoT devices across many sectors. This study's demonstration of the shift from centralized to distributed communication architectures is an excellent example of how everyone is working together to improve security in the context of 5G networks and IoT ecosystems. Sławomir Kuklin´ ski [5] As said before, their main goal is to fix the security holes in the 5G Proximity Services (ProSe) Device-to-Device (D2D) standard. Since they recognized drones as one of the most widely used Internet of Things (IoT) devices that would be able to utilize 5G services, they customized their solution specifically for the drone use case. This makes their solution unique. Althoughtheirsolutionhas been expressly created to address the security concerns related to drones, it's important to keep in mind that the same architecture may find use in a wide range of other IoT devices across a wide range of industries, including medical and automotive networks.In the proposed scenario, they function on the premise that, in a swarm of drones, there is only one drone that is in cellular range, which functions as a leader drone or data relay. The other drones in the swarm connect Device-to-Device (D2D) to this leading drone in this distributed design. As a User Equipment (UE)-to-Network Relay, the leader drone plays a crucial role in enabling smooth communicationbetweenthe5Gcorenetworkandthe other drones in the swarm. Mutual authentication must be used in this complex configuration to guarantee that the leader drones and the other linked devices create a reliable and safe communication environment. The deliberate selection of dronesas the central componentoftheirsolution is indicative of the growing ubiquity of these gadgets and their wide range of uses in different sectors. They contribute to both the drone industry and the larger IoT device ecosystem by utilizing the 5G D2D ProSe standard to secure the communication channels within a drone swarm. With reciprocal authentication, possible security risks and vulnerabilities present in the 5G D2D ProSe standard are reduced, improving the overall security posture. Thus, our study serves as evidence of the flexibility and wide applicability of security solutions designed forparticularuse cases in the rapidly changingcontext of 5G networks and IoT ecosystems. Salima Smaoui [6] It is expected that 5G mobile cellular networks in the futurewill supportawiderangeofneedsand creative use cases. High-speed data rates—which are particularly important for mobility—and the guarantee of a stable and dependable network securitysystemarethemain concerns of users. The Third Generation Partnership Project (3GPP) released its initial setof 5G security standardsinJune and December of 2018, which were significant advances in response to these changing needs. Although security has improved significantly over the past few generations, our collaborative research with other researchers exposes multiple security-relatedassumptionsinthesystemlogicand multiple protocol edge scenarios that leave 5G systems vulnerable to different types of attacks. Researchers work together to present SEL-AKA, a simple, efficient, and safe method for key agreement and authentication. Not only are vulnerabilities being found, but creative fixes are also being offered to strengthen 5G networks' security framework. The study highlights the collaborative endeavors of scholars in tackling security issues and shows their unwavering dedication to augmenting the security and dependability of forthcoming 5G networks. Sergiy Gnat Yuk [7] This paper presents an extensive technique designed to assess security key indicators in modern cellular networks. An evaluation of these networks' current security configurations is an essential first step towardimprovingdatatransmissionsecurity.However,there is a drawback to the existing assessment approaches in use: they are unable to distinguish between the key performance and quality metrics related to specific services provided by
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 141 mobile operators. Consequently, this restriction makes it more difficult to monitor service delivery security and modernize cellular networks. This study's methodology closes this gap by emphasizing important performance and quality metrics. These measures serve as the cornerstone of an extensive summary table that includes formulae for calculating these vital parameters. This table gives more flexibility in evaluating the security of services rendered by cellular networks, based on statistical data received from individual users. Through theidentificationandresolutionof these primary issues, themethodologyimprovesthecapacity to discover security flaws and obstacles in contemporary cellular networks. Essentially, this study offers a methodical and realistic strategy to attain security in cellular networks, in addition to advocating for a more nuanced assessment of such security. The described methodology is a useful resource for researchers and practitioners alike, providing a systematic framework for evaluating and enhancing the security posture of modern cellular networks and ultimately bolstering the overall resilience and robustness of the telecommunications infrastructure. Shailesh Pramod Bendale [8] The introduction of 5G mobile wireless networks has raised several security issues, calling for a careful examination and comprehension of the environment. To fully understand the subtle differences, a detailed comparison of the upcoming 5G mobile wireless network and the current 4G cellular network is necessary. The priority is to provide a thorough explanation of the new standards and unique characteristics of the 5G network, illuminating the reasons for the developments in 5G Mobile Security. An essential component of this research is a thorough analysis of the security issues and hazards related to the 5G mobile wireless network. Understanding how the threat landscape is changing is essential to putting strong security measures in place. As such, it is necessary to investigate the most recent changes made to the security services that the 5G mobile network offers. This covers a wide range of topics and includes crucial elements such device authentication, network accessibility in particular places, data privacy, confidentiality, and intrusion detection. The security architecture must be improved significantly in this paradigm shift from 4G to 5G to handle the changing expectations and obstacles. During the shift, itisnecessaryto be aware of the possible hazards and to take proactive steps to address them. The cooperationamongthetelecomsector's members highlights the industry's shared commitment to strengthening the security underpinnings of 5G mobile networks. They clear the path for a more robust and safer mobile wireless network that is in line with the cutting-edge features and standards brought forth by 5G technology by closely examining and modifying security services. Mohammad Shurman [9] Among the key components of the upcoming 5G cellular network, network slicing stands out as a paradigm leap in network architecture. It entails splitting up a single physical network into several virtual networks, each specifically designed to accomplish different objectives including improved security, flexibility, and control. This novel method makes it easierto isolatedevices, services,and core networkslogically, enabling separateconfigurationsfor various features and service kinds. The focus of this study is on the end-to-end network slicing idea in 5G networks, and how it may be used to isolate slices, improve overall performance, and lower latency, especially for critical applications. The 5G infrastructure's ability to handle a variety of services and applications more effectively and individually is made possible by the logical isolation that is obtained through network slicing. The study usessimulation data from the NS-3 network simulator toverifytheefficacyof this strategy. The results of these simulations validate the statements made about performance and latency enhancements. This empiricaldatahighlightstheadvantages and practical ramificationsofdeployingnetworkslicingin5G networks in addition to supporting the study's theoretical underpinnings.Essentially,themoveto5Gnetworksinvolves more than just faster speeds; it also involves a complete redesign of network architecture, which is typified by characteristics like network slicing. Together, these industry professionals have undertaken research that demonstrates their dedication to investigating and verifying novel approaches that not only fulfill but surpass performance, latency, and securityrequirementsintherapidlychanging5G cellular network environment. Kashif Munir[10]Thestudyarticlesuggestsanovelapproach to guarantee fault-tolerance and secure Distributed Mobility Management (DMM) activities. This new method effectively manages locations in a distributed fashion by using a distributed hash table of access nodes. This methodprovides an organized and effective way to map the location binding information of Mobile Nodes (MNs) andthenetworkprefixes of access nodes on a Chord circle. The proposed method's inclusion of a replication technique is a crucial component. The restrictionsand vulnerabilities relatedtoasinglecentral location server are addressed by this deliberate inclusion. The replication technique improves the system's fault tolerance by reducing vulnerabilities to assaults and single points of failure. It also removes traffic jams that could seriously hinder the timely addition and update of location binding data for MNs. Additionally, the method reduces lengthy response times for location queries issued by Correspondent Nodes (CNs), which boosts DMM operations' overall effectiveness. The importance of decentralization in the suggested approach is shown by the focus on location server dispersion. The researchers hope to strengthen the system's robustness and resilience against potential failures and security concerns by dispersing the locationservers.The transition of DMM operations from a centralized to a distributed approach shows a dedication to tackling modern mobile network management issues.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 142 3. COMPARATIVE ANALYSIS Comparative studies emphasize changestosecurityservices and security challenges during the 4G–5G transition. To improve speed and reduce latency for various applications, network slicing is investigated as a crucial component. Furthermore, to reduce the risks related to centralized servers, novel techniques for fault-tolerant distributed location management in 5G networks are suggested. Ultimately, by addressing issues and offering solutions from a variety of approaches and viewpoints, these studies provide a thorough grasp of the changing landscape of 5G cellular network security. In summary, this study highlights the value of a distributed strategy in overcoming the drawbacks of a centralized location server in addition to presenting a novel technique for safeandfaulttolerantDMM operations. This study's combined efforts serve as an excellent example of the researchers' dedication to furthering the subject of mobile network management. Table -1: various methods and their evaluations SL.no AUTHOR METHODS USED MERITS 1 Sungmoon Kwon et.al [1] Suggested a successful detection method for the IPSec disable attack and PFCP-in-GTP. Evaluates the differences in performance between a 5G IPS system and traditional NGFWs using the used scheme. 2 M Awais Javed et.al [2] DDOS/DoS mitigation and the use of sophisticated authentication techniques for a more dependable cellular communication network Increased authentication. 3 Ke Xiao etal [3] Created a secure channel model for 5G millimeter Wave small cell communication based on ray tracing. Enhances secrecy capacity. 4 Abdel-Malek et al. [4] A Proxy Signature-Based Drone Authentication in 5G D2D Networks A quick, dependable, and lightweight authentication method that works with the 5G D2D ProSe standard procedures. 5 Sławomir Kuklin et al [5] Digital forensic techniqueswere used to conduct an analysis of the GSM network. SDR or mobile phone based low-cost terminals can be utilized for GSM radio channel sniffing. 6 Salima Smaoui et.al [6] Key Agreement Protocol (SEL- AKA) of the 5G cellular network, which providessecure, lightweight, and efficient authentication. Safe from a varietyof threats, including those related to secrecy and authentication. 7 Sergiy Gnatyuk et.al [7] An approach that assesses cellularnetwork efficiency and quality of service metrics according to security standards An approach that assesses cellular network efficiency and qualityofservice metrics according to security standards. 8 Shailesh Pramod Bendaleet.al [8] Based on Internet of Things (IoT), (mMIMO), (D2D) and (SDN). Provides high availability, confidentiality, and Integrity. 9 Mohammad Shurman et.al [9] Uses end-to-end network slicing concept in 5G networks slices prioritizing them in order Design supports the requirements of latency, throughput, and availability. 10 Kashif Munir et.al [10] A secure and fault-tolerant mechanism that uses a distributedhash table Assistance with planning and designing the processing needs for an AN on 5G n/w 3. CONCLUSIONS 5G wireless networks are expected to change the telecom industry by providing better performance and opening a wide range of new applications. To fully realize thepotential of this revolutionary technology, security is essential, and this article explores the most recent developments in 5G wireless security in detail.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 143 An analysis of the current security services offered by 5G networks forms the basis of the analysis. These services cover important areas like privacy, key management, availability, and confidentiality of data. To guarantee the integrity and dependability of 5G communications, it is imperative to comprehend and strengthen these fundamental security components. The essay explores the security consequences of deploying cutting-edgetechnology in the context of 5G, in addition to the well-known security services. It is projected that new security features would be introduced to the 5G paradigm by technologies including Software-Defined Networking (SDN), Internet of Things (IoT), huge Multiple-Input Multiple-Output (MIMO),Device- to-Device (D2D) communication, and heterogeneous networks (HetNet). These technologies are complex; thus, a summary of their security considerations is required. Examining security in the context of HetNet entails tackling issues related to the amalgamation of several network topologies. While huge MIMO poses challenges relating to securing a large array of connected antennas, D2D communication raises questions concerning direct and secure device interactions. Conversely, SDN and IoT present distinct security issues, ranging from network programmability to overseeing the security of networked devices. The distilled summary of these security issues highlights the variety and intricacyofsecurityissuesthatare emerging in the context of 5G. It emphasizes the necessity of an all-encompassing and flexible security framework that can change quickly to keep up with technological breakthroughs. To build confidence inthedependabilityand security of the developing 5G ecosystem, it is critical tosolve these security issues as 5G networks become the foundation of communication for a variety of applications, from driverless cars to smart cities. REFERENCES [1] Sungmoon Kwon,” Session Management for Security Systems in 5G Standalone Network” [2] M Awais Javed ”5G Security Artifacts (DoS / DDoS and Authentication” [3] [3] Ke Xiao, Wei Li, Michel Kadoch, and Chen Li” On the Secrecy Capacity of 5G MmWave Small Cell Networks” [4] Abdel-Malek” A Proxy Signature-Based Drone Authentication in 5G D2D Networks” [5] Sławomir Kuklin´” Evaluation of PrivacyandSecurityof GSM Using Low-Cost Methods [6] Salima Smaou” A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL- AKA” [7] Shailesh Pramod Bendale”Security Threats and Challenges in Future Mobile Wireless Networks ” [8] Sergiy Gnatyuk” Security Key Indicators Assessmentfor Modern Cellular Networks” [9] MohammadShurman,”PerformanceEnhancementin5G Cellular Networks Using Priorities in Network Slicing” [10] Kashif Munir” A secure and fault-tolerant mechanism that uses a distributed hash table Help in designing and planning the processing requirements on an AN in 5G networks.”
Download now