Abstract
Having an infrastructure capable of exchanging data at high speed is an efficient way to drive the evolution and development of new applications and existing services. The 5G technology has emerged as a trusted source to meet the increased demand of Internet of Things (IoT) devices connected to the network, in addition to enabling Internet connectivity at high broadband speeds. Another important feature of 5G is to allow the use of Software Defined Network (SDN) and Network Function Virtualization (NFV), mechanisms responsible for performing network configurations through software, as well as the control and management of devices using the configuration network functions or device virtualization. The concern with information security in the 5G network is increasing, as cybercriminals try to access important data that is transported over the network, since the demand for connected IoT devices will be greater, allowing for several possibilities of attacks. The understanding of possible threats and attacks is necessary, so that new measures are taken against cybercrimes presented in the 5G and IoT networks. This paper aims to elucidate some conceptions of what 5G technology is and the use of IoT in this network, contextualizing the SDN and NFV paradigms to allow the configuration of the functionality and management of the network by software. In addition, concerns are reported about possible information security attacks that can occur in 5G networks.
Publisher
Sociedade Brasileira de Computacao - SB
Reference69 articles.
1. 3GPP (2019). 3rd generation partnership project; technical specification group services and system aspects; release 15 description; summary of rel-15 work items (release 15). 3GPP Release 15, pages 1-118. Available online [link].
2. Abbas, S. G., Husnain, M., Fayyaz, U. U., Shahzad, F., Shah, G. A., and Zafar, K. (2020). Iot-sphere: A framework to secure iot devices from becoming attack target and attack source. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 1402-1409. DOI: 10.1109/TrustCom50675.2020.00189.
3. Abdulkarem, H. S. and Dawod, A. (2020). Ddos attack detection and mitigation at sdn data plane layer. In 2020 2nd Global Power, Energy and Communication Conference (GPECOM), pages 322-326. DOI: 10.1109/GPECOM49333.2020.9247850.
4. Abdulqadder, I. H., Zhou, S., Zou, D., Aziz, I. T., and Akber, S. M. A. (2020a). Bloc-sec: Blockchain-based lightweight security architecture for 5g/b5g enabled sdn/nfv cloud of iot. In 2020 IEEE 20th International Conference on Communication Technology (ICCT), pages 499-507. DOI: 10.1109/ICCT50939.2020.9295823.
5. Abdulqadder, I. H., Zhou, S., Zou, D., Aziz, I. T., and Akber, S. M. A. (2020b). Multi-layered intrusion detection and prevention in the sdn/nfv enabled cloud of 5g networks using ai-based defense mechanisms. Computer Networks, 179:107364. DOI: 10.1016/j.comnet.2020.107364.