2021
DOI: 10.1109/access.2021.3105396
|View full text |Cite
|
Sign up to set email alerts
|

5G Security Challenges and Solutions: A Review by OSI Layers

Abstract: The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 119 publications
(181 reference statements)
0
15
0
Order By: Relevance
“…There are various features of the applied 5G such as high data speed, increased bandwidth, and increased availability, which ensures the reliability and availability in the proposed scheme. 18…”
Section: Authority and Data Transfer Layermentioning
confidence: 99%
See 2 more Smart Citations
“…There are various features of the applied 5G such as high data speed, increased bandwidth, and increased availability, which ensures the reliability and availability in the proposed scheme. 18…”
Section: Authority and Data Transfer Layermentioning
confidence: 99%
“…This happened because the features of the employed 5G network, that is, Latency EndÀtoÀend < 1 ms and Data_Speed 5G ≤ 10 Gbps ensures the scalability and reliability in the proposed scheme. 18…”
Section: Scalabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…The authors also created an attack tree and developed 15 test cases that can be applied to real networks and identified eight valid vulnerabilities. Gerrit et al [ 35 ] studied possible threats according to the STRIDE threat classification model and derive a risk matrix based on the likelihood and impact of 12 threat scenarios that affect the radio access and the network core. Sullivan et al [ 36 ] categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, the authors discuss vulnerabilities, threats, security solutions, challenges, gaps, and open research issues.…”
Section: Background and Related Workmentioning
confidence: 99%
“…1612 Sofia, Bulgaria. 3 Department of Electrical and Computer Engineering, University of Western Macedonia, 50100 Kozani, Greece. 4 MONTIMAGE, 75013 Paris, France.…”
mentioning
confidence: 99%