5G Security Challenges and Solutions: A Review by OSI Layers
The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to t...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9514842/ |
_version_ | 1818718455796334592 |
---|---|
author | S. Sullivan Alessandro Brighente S. A. P. Kumar M. Conti |
author_facet | S. Sullivan Alessandro Brighente S. A. P. Kumar M. Conti |
author_sort | S. Sullivan |
collection | DOAJ |
description | The Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. We categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers, the physical layer between the base stations and users’ device presents increased opportunities for attacks such as eavesdropping and data fabrication. However, no single OSI layer can stand on its own to provide proper security. All layers in the 5G must work together, providing their own unique technology in an effort to ensure security and integrity for 5G data. |
first_indexed | 2024-12-17T19:51:20Z |
format | Article |
id | doaj.art-6a8e4220acd249db8e489ae1fa6f5318 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-17T19:51:20Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-6a8e4220acd249db8e489ae1fa6f53182022-12-21T21:34:43ZengIEEEIEEE Access2169-35362021-01-01911629411631410.1109/ACCESS.2021.310539695148425G Security Challenges and Solutions: A Review by OSI LayersS. Sullivan0Alessandro Brighente1https://orcid.org/0000-0001-6138-2995S. A. P. Kumar2https://orcid.org/0000-0002-3162-2211M. Conti3https://orcid.org/0000-0002-3612-1934Department of Computing Sciences, Coastal Carolina University, Conway, SC, USADepartment of Mathematics, University of Padua, Padua, ItalyDepartment of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH, USADepartment of Mathematics, University of Padua, Padua, ItalyThe Fifth Generation of Communication Networks (5G) envisions a broader range of services compared to previous generations, supporting an increased number of use cases and applications. The broader application domain leads to increase in consumer use and, in turn, increased hacker activity. Due to this chain of events, strong and efficient security measures are required to create a secure and trusted environment for users. In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. We categorize security technologies using Open Systems Interconnection (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most interesting findings are in layer one, the physical layer. In fact, compared to other layers, the physical layer between the base stations and users’ device presents increased opportunities for attacks such as eavesdropping and data fabrication. However, no single OSI layer can stand on its own to provide proper security. All layers in the 5G must work together, providing their own unique technology in an effort to ensure security and integrity for 5G data.https://ieeexplore.ieee.org/document/9514842/5G technologiessecurity issuessecurity solutionsOSI layer5G vulnerabilities |
spellingShingle | S. Sullivan Alessandro Brighente S. A. P. Kumar M. Conti 5G Security Challenges and Solutions: A Review by OSI Layers IEEE Access 5G technologies security issues security solutions OSI layer 5G vulnerabilities |
title | 5G Security Challenges and Solutions: A Review by OSI Layers |
title_full | 5G Security Challenges and Solutions: A Review by OSI Layers |
title_fullStr | 5G Security Challenges and Solutions: A Review by OSI Layers |
title_full_unstemmed | 5G Security Challenges and Solutions: A Review by OSI Layers |
title_short | 5G Security Challenges and Solutions: A Review by OSI Layers |
title_sort | 5g security challenges and solutions a review by osi layers |
topic | 5G technologies security issues security solutions OSI layer 5G vulnerabilities |
url | https://ieeexplore.ieee.org/document/9514842/ |
work_keys_str_mv | AT ssullivan 5gsecuritychallengesandsolutionsareviewbyosilayers AT alessandrobrighente 5gsecuritychallengesandsolutionsareviewbyosilayers AT sapkumar 5gsecuritychallengesandsolutionsareviewbyosilayers AT mconti 5gsecuritychallengesandsolutionsareviewbyosilayers |