A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

Author:

Scalise Paul1ORCID,Boeding Matthew1ORCID,Hempel Michael1ORCID,Sharif Hamid1ORCID,Delloiacovo Joseph2,Reed John2

Affiliation:

1. Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA

2. Belcan Government Solutions (BGS), Bellevue, NE 68123, USA

Abstract

With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today’s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.

Funder

University of Nebraska-Lincoln’s Advanced Telecommunications Engineering Laboratory (TEL) and Belcan Government Solutions

Publisher

MDPI AG

Reference147 articles.

1. Vintilă, C.E., Patriciu, V.V., and Bica, I. (2011, January 9–13). Security analysis of LTE access network. Proceedings of the 10th International Conference on Network, Valencia, Spain.

2. (2023). Security Architecture and Procedures for 5G System (Standard No. TS 33.501). Available online: https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/.

3. (2023). Technical Specification Group Services and System Aspects; 3GPP System Architecture Evoltuion (SAE); Security Architecture, Release 17, V17.4.0 (Standard No. TS 33.401).

4. Dutta, A., and Hammad, E. (2020, January 10–12). 5G Security Challenges and Opportunities: A System Approach. Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), Bangalore, India.

5. A Survey on Security Aspects for 3GPP 5G Networks;Cao;IEEE Commun. Surv. Tutor.,2020

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3