Professional Documents
Culture Documents
5G in The Internet of Things Era: An Overview On Security and Privacy Challenges
5G in The Internet of Things Era: An Overview On Security and Privacy Challenges
net/publication/345761252
CITATIONS READS
0 1,027
2 authors, including:
Navodya Hemachandra
University of Sri Jayewardenepura
2 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Navodya Hemachandra on 12 November 2020.
B.M.N.T.Hemachandra – ICT/17/821
K.G.D.S.Bandra – ICT/17/805
2020 - Octomber
Abstract
The world is rapidly expanding with 5G technology, which promise to revolutionize the
mobile wireless communications, providing faster services, very low delays, and a very
pervasive connectivity via mobile devices, but it is worth to remember the Internet of Things
(IOT) takes the major advantage of this 5G technology. The Internet of Things is a system in
which computing equipment, machinery, and digital machines are related to each other. In fast
few decades people had great encouragement about IOT which makes it possible or accessible to
be applied in various fields, including home robotics, intelligent cities and Augmented Reality
(AR). There were many recent cellular standards like long-term evolution (LTE) have been
introduced for mobile devices but are not well suited for low-power and low data rate devices
such as the IoT devices. In particularly, 5G aims to address the limitations of previous cellular
standards and be a potential key enabler for future IoT. In this paper, we are going to mainly
discuss about 5G technology technical and privacy challenges. At the middle, the role of
emerging models such as IoT and fog computing is explored a bit.
Key words
5G, Security, Privacy, IOT, Fog computing
Introduction
Evolution of the Mobile Wireless
technology provides high data rates to perform
multimedia data and communication
transmissions to end users. The diffusion of
mobile devices in this digital era enforce to the
increment of network traffic. Compared to the
actual 4G technologies, 5G is characterized by
higher bit rates, quantified in more than 10
gigabits per second, as well as by more capacity
and very low latency.
IOT
5G will radically change the way our world networks. It won’t be long before worldwide
society will have to adapt to the new way of technological life - across industries, markets and
regions. This new technology standard promises much more than just further developments of
existing mobile communication technologies.We have innumerable studies that are trying to
quantify and predict the material impact of Fifth Generation (5G) and the Internet of Things
(IoT). 5G IoT reaches new dimensions in all aspects.
The data throughput in the new network should reach up to 20 gigabits per second and
allow shorter response times. As a piquant comparison, the first cell phone with 1G network
connectivity is eight million times less than a 5G network. With 5G, it will also be possible to
transmit data in real time. This means that 100 billion mobile devices around the world would be
accessible at the same time.
Security and privacy
We have already discussed about features of 5G. Basically, 5G means that internet
penetration will much higher, and more operations will rely on internet connections in the future.
Thus, we will be surrounded by various networks more than ever before. However, as with most
innovations there is a flip-side too. 5G security is another important aspect we should discuss.
Here we are going to discuss some risks.
Fog computing
Security of an information is a top concern for businesses, government, and individuals in
today’s world, because millions of devices become connected to the internet. Hackers can easily
find new vulnerabilities to exploit and increasingly sophisticated attacks make it far more
difficult for systems to identify protect and react to these threats beyond stealing intelligence or
disrupting business activities.
Fog computing and fog computing architecture is enabling innovation for IOT 5G has
emerged as a solution for mitigating such threats. Fogs distributed architecture safeguards
connected systems from cloud to device creating and additional layer of system security in which
compute control storage , networking and communications works closer to the services and the
data sources they serve and protect with fog security resides directly in the local contexts not as a
remote function.
Fog nodes protect cloud based IOT and fog based services by performing a wide range of
security functions on any number of interconnected devices. Fog computing provides a trusted
distributed platform and execution environment for applications and services, managing and
updating security credentials, malware detections, distributing timely software patches quickly
and scale and more.
Conclusion
5G will enable new use cases that aren’t available today, with huge potential benefits for
the world at large. But it will also create new opportunities for those who wish to exploit this
new technology. As potentially the most critical of critical infrastructures, it will also need to be
the safest and most secure. Understanding how enormously different 5G cybersecurity
challenges are from the traditional ones is the first step. 5G security cannot be achieved through
a one-size-fits-all approach. Different 5G system entities will have different security needs –
understanding this will be foundational to building secure network operations.
In the era of 5G, it's important that, when we begin to conceptualize security on a system
wide level where telecom networks are an important component, In the Privacy there are
Protection of personal privacy is a critical aspect of 5G security. Challenges include access to
location information, or leakage of personal voice, health, and lifestyle data. When data
Encryption, its affecting 5G security too. And other way around. In an increasingly digital world,
encryption has become the primary mechanism for securing information.
There are some security challenges in occurs in 5G like the physical structure of the
network. Its provide low latency and localization. Another thing is network function
virtualization. In that case components are placed across distributed and centralized core clouds.
Another challenge is implementation of flexible software-based architecture technologies such as
SDN (Software Defined Networks), SDA (Software Defined Access) and SDR (Software
Defined Radio).
Discussion
5G will enable new use cases that aren’t available today, with huge potential benefits for
the world at large, But it will also create new opportunities for those who wish to exploit this
new technology. In future, 5g could enable smart city infrastructure and truly autonomous
driving with security using contribute with IOT. 5G fixed wireless will reshape the broadband
ISP and services landscape(faster smartphones, 5G NR technologies will reshape) and enable
wireless gigabit and multi gigabit internet service in our home and office without need of WIFI.
When we talk about security and privacy in 5G, we can do these little things to protect
our privacy. As the need for network protection will only grow, we should ensure security by
using a VPN (Virtual private network). A VPN encrypts your traffic, so no one can see what you
do and intercept it. Users should also prefer applications offering extensive encryption
capabilities, such as end-to-end encryption and reliable algorithms. You should also minimize
the number of connected devices you use. Moreover, protect your devices use the most up-to-
date antivirus security software and make sure to tune up its settings for maximum safety.
Bibliography/References
(Sicari, Rizzardi and Coen-Porisini, 2020)Guo, S. et al. (2017) ‘Cross stratum resources protection in fog-
computing-based radio over fiber networks for 5G services’, Optical Fiber Technology. Elsevier Inc., 37,
pp. 61–68. doi: 10.1016/j.yofte.2017.07.001.
Lv, Z., Lloret, J. and Song, H. (2020) ‘Internet of Things and augmented reality in the age of 5G’,
Computer Communications. Elsevier B.V. doi: 10.1016/j.comcom.2020.08.019.
Sicari, S., Rizzardi, A. and Coen-Porisini, A. (2020) ‘5G In the internet of things era: An overview on
security and privacy challenges’, Computer Networks. Elsevier B.V., 179(May), p. 107345. doi:
10.1016/j.comnet.2020.107345.