4.6 Article

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap

期刊

IEEE ACCESS
卷 9, 期 -, 页码 4466-4489

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3047895

关键词

Security; Internet of Things; 5G mobile communication; Protocols; Privacy; Analytical models; Solid modeling; Fifth generation mobile communication systems (5G); Internet of Things (IoT); security; privacy; key management; authentication; access control; intrusion detection

资金

  1. Office of the Assistant Secretary of Defense for Research and Engineering [OASD (RE)] [FA8750-15-2-0120]
  2. FCT/MCTES
  3. EU funds [UIDB/50008/2020]
  4. Brazilian National Council for Scientific and Technological Development (CNPq) [309335/2017-5]
  5. Ripple Centre of Excellence (CoE) Scheme, CoE in Blockchain, International Institute of Information Technology (IIIT) Hyderabad, India [IIIT/R&D Office/Internal Projects/001/2019]

向作者/读者索取更多资源

5G mobile communication systems have enabled the interconnection of not only people but also machines and devices. The IoT communication environment supported by 5G enables a wide variety of applications, but also faces various security and privacy issues. Protecting the infrastructure of 5G-enabled IoT communication environment against attacks is crucial, necessitating the proposal of various security protocols by researchers.
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据