2020
DOI: 10.1007/978-3-030-35746-7_9
|View full text |Cite
|
Sign up to set email alerts
|

5G Cybersecurity Vulnerabilities with IoT and Smart Societies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The heterogeneity of connected devices makes the private data unprotected due to the lack of proper security infrastructure. The absence of cryptographic integrity protection for user data plane provides additional security threats to IoT devices [27]. The exponential growth of IoT devices will make DDoS attacks more catastrophic and way more easier to arrange [28].…”
Section: Security Challenges Of Iotmentioning
confidence: 99%
“…The heterogeneity of connected devices makes the private data unprotected due to the lack of proper security infrastructure. The absence of cryptographic integrity protection for user data plane provides additional security threats to IoT devices [27]. The exponential growth of IoT devices will make DDoS attacks more catastrophic and way more easier to arrange [28].…”
Section: Security Challenges Of Iotmentioning
confidence: 99%
“…Another anticipated method is the MitM attack, where an attacker intercepts communication between two parties to steal data or inject malicious content. The increased reliance on edge computing and IoT devices, which often have weaker security measures, makes 5G networks potentially more vulnerable to MitM attacks [96]. The APTs are another anticipated attack method in 5G networks.…”
Section: Attack Methods and Techniquesmentioning
confidence: 99%
“…This section delves into an analysis of notable breach events, focusing on the type of attack, tactics utilized by attackers, the network's vulnerabilities exploited, and the resulting implications. One of the significant breach events in recent history involved exploiting the vulnerabilities of the 5G AKA protocol [96]. There exists a notable instance where attackers exploited the 5G AKA protocol, which led to an MitM attack [71].…”
Section: Security Breaches In 5g Networkmentioning
confidence: 99%
“…Society's use of IoT technology has grown rapidly in recent years, with a variety of applications designed to increase convenience, efficiency and security (Shah et al, 2020). One of the most common use cases for IoT is in the smart home.…”
Section: Iot Technology In Societymentioning
confidence: 99%