Survey on authentication and security protocols and schemes over 5G networks

The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginnin...

Full description

Bibliographic Details
Main Authors: Yahya Tashtoush, Dirar Darweesh, Ola Karajeh, Omar Darwish, Majdi Maabreh, Safa’ Swedat, Rawan Koraysh, Omar Almousa, Nasser Alsaedi
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2022-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/15501329221126609
_version_ 1827008849773592576
author Yahya Tashtoush
Dirar Darweesh
Ola Karajeh
Omar Darwish
Majdi Maabreh
Safa’ Swedat
Rawan Koraysh
Omar Almousa
Nasser Alsaedi
author_facet Yahya Tashtoush
Dirar Darweesh
Ola Karajeh
Omar Darwish
Majdi Maabreh
Safa’ Swedat
Rawan Koraysh
Omar Almousa
Nasser Alsaedi
author_sort Yahya Tashtoush
collection DOAJ
description The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.
first_indexed 2024-03-12T18:46:46Z
format Article
id doaj.art-86fe18042edc43c5b73a7b670fb403d3
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2025-02-18T12:39:22Z
publishDate 2022-10-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-86fe18042edc43c5b73a7b670fb403d32024-11-02T04:12:25ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772022-10-011810.1177/15501329221126609Survey on authentication and security protocols and schemes over 5G networksYahya Tashtoush0Dirar Darweesh1Ola Karajeh2Omar Darwish3Majdi Maabreh4Safa’ Swedat5Rawan Koraysh6Omar Almousa7Nasser Alsaedi8Computer Science Department, Jordan University of Science and Technology, Irbid, JordanComputer Science Department, Jordan University of Science and Technology, Irbid, JordanComputer Science Department, Virginia Polytechnic Institute and State University, Blacksburg, VA, USAInformation Security Applied Computing, Eastern Michigan University, Ypsilanti, MI, USADepartment of Information Technology, Faculty of Prince Al-Hussein Bin Abdallah II For Information Technology, The Hashemite University, P.O. Box 330127, Zarqa 13133, JordanComputer Science Department, Jordan University of Science and Technology, Irbid, JordanComputer Science Department, Jordan University of Science and Technology, Irbid, JordanComputer Science Department, Jordan University of Science and Technology, Irbid, JordanComputer Science Department, Taibah University, Medina, Saudi ArabiaThe emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.https://doi.org/10.1177/15501329221126609
spellingShingle Yahya Tashtoush
Dirar Darweesh
Ola Karajeh
Omar Darwish
Majdi Maabreh
Safa’ Swedat
Rawan Koraysh
Omar Almousa
Nasser Alsaedi
Survey on authentication and security protocols and schemes over 5G networks
International Journal of Distributed Sensor Networks
title Survey on authentication and security protocols and schemes over 5G networks
title_full Survey on authentication and security protocols and schemes over 5G networks
title_fullStr Survey on authentication and security protocols and schemes over 5G networks
title_full_unstemmed Survey on authentication and security protocols and schemes over 5G networks
title_short Survey on authentication and security protocols and schemes over 5G networks
title_sort survey on authentication and security protocols and schemes over 5g networks
url https://doi.org/10.1177/15501329221126609
work_keys_str_mv AT yahyatashtoush surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT dirardarweesh surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT olakarajeh surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT omardarwish surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT majdimaabreh surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT safaswedat surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT rawankoraysh surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT omaralmousa surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks
AT nasseralsaedi surveyonauthenticationandsecurityprotocolsandschemesover5gnetworks