5G Security Challenges and Solutions: A Review by OSI Layers

The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to t...

Full description

Bibliographic Details
Main Authors: S. Sullivan, Alessandro Brighente, S. A. P. Kumar, M. Conti
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9514842/
_version_ 1818718455796334592
author S. Sullivan
Alessandro Brighente
S. A. P. Kumar
M. Conti
author_facet S. Sullivan
Alessandro Brighente
S. A. P. Kumar
M. Conti
author_sort S. Sullivan
collection DOAJ
description The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. We categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers, the physical layer between the base stations and users’ device presents increased opportunities for attacks such as eavesdropping and data fabrication. However, no single OSI layer can stand on its own to provide proper security. All layers in the 5G must work together, providing their own unique technology in an effort to ensure security and integrity for 5G data.
first_indexed 2024-12-17T19:51:20Z
format Article
id doaj.art-6a8e4220acd249db8e489ae1fa6f5318
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T19:51:20Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6a8e4220acd249db8e489ae1fa6f53182022-12-21T21:34:43ZengIEEEIEEE Access2169-35362021-01-01911629411631410.1109/ACCESS.2021.310539695148425G Security Challenges and Solutions: A Review by OSI LayersS. Sullivan0Alessandro Brighente1https://orcid.org/0000-0001-6138-2995S. A. P. Kumar2https://orcid.org/0000-0002-3162-2211M. Conti3https://orcid.org/0000-0002-3612-1934Department of Computing Sciences, Coastal Carolina University, Conway, SC, USADepartment of Mathematics, University of Padua, Padua, ItalyDepartment of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH, USADepartment of Mathematics, University of Padua, Padua, ItalyThe Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. We categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers, the physical layer between the base stations and users’ device presents increased opportunities for attacks such as eavesdropping and data fabrication. However, no single OSI layer can stand on its own to provide proper security. All layers in the 5G must work together, providing their own unique technology in an effort to ensure security and integrity for 5G data.https://ieeexplore.ieee.org/document/9514842/5G technologiessecurity issuessecurity solutionsOSI layer5G vulnerabilities
spellingShingle S. Sullivan
Alessandro Brighente
S. A. P. Kumar
M. Conti
5G Security Challenges and Solutions: A Review by OSI Layers
IEEE Access
5G technologies
security issues
security solutions
OSI layer
5G vulnerabilities
title 5G Security Challenges and Solutions: A Review by OSI Layers
title_full 5G Security Challenges and Solutions: A Review by OSI Layers
title_fullStr 5G Security Challenges and Solutions: A Review by OSI Layers
title_full_unstemmed 5G Security Challenges and Solutions: A Review by OSI Layers
title_short 5G Security Challenges and Solutions: A Review by OSI Layers
title_sort 5g security challenges and solutions a review by osi layers
topic 5G technologies
security issues
security solutions
OSI layer
5G vulnerabilities
url https://ieeexplore.ieee.org/document/9514842/
work_keys_str_mv AT ssullivan 5gsecuritychallengesandsolutionsareviewbyosilayers
AT alessandrobrighente 5gsecuritychallengesandsolutionsareviewbyosilayers
AT sapkumar 5gsecuritychallengesandsolutionsareviewbyosilayers
AT mconti 5gsecuritychallengesandsolutionsareviewbyosilayers