2021
DOI: 10.1109/jiot.2021.3068463
|View full text |Cite
|
Sign up to set email alerts
|

Is 5G Handover Secure and Private? A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(6 citation statements)
references
References 119 publications
0
6
0
Order By: Relevance
“…In addition, the authors in [25] studied the security performance of 5G networks beside the vulnerabilities and requirements of newly developed concepts such as mIoT, D2D, V2X and network slicing, coming to the conclusion about the various solutions to consolidate the authentication process. Likewise, the handover was classified based on RAT and frequency in HetNets and the privacy and security threats during vertical handovers (within 3GPP, between 3GPP and non-3GPP, between non-3GPP) and horizontal handovers (intra-mobile service controller (MSC), inter-MSC) and the solutions to foil them, were discussed in [26]. Table 2 briefly summarizes related surveys.…”
Section: Review Of Related Surveysmentioning
confidence: 99%
“…In addition, the authors in [25] studied the security performance of 5G networks beside the vulnerabilities and requirements of newly developed concepts such as mIoT, D2D, V2X and network slicing, coming to the conclusion about the various solutions to consolidate the authentication process. Likewise, the handover was classified based on RAT and frequency in HetNets and the privacy and security threats during vertical handovers (within 3GPP, between 3GPP and non-3GPP, between non-3GPP) and horizontal handovers (intra-mobile service controller (MSC), inter-MSC) and the solutions to foil them, were discussed in [26]. Table 2 briefly summarizes related surveys.…”
Section: Review Of Related Surveysmentioning
confidence: 99%
“…In B5G HO, privacy and security are the main issues that must be addressed to ensure ultra-reliability. A comprehensive study on privacy and security was presented in [90]. This study outlined a complete set of security and privacy standards for 5G HetNet HOs to prevent possible threats and attacks.…”
Section: N Privacy and Securitymentioning
confidence: 99%
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%