3 research outputs found

    Security in 5G-Enabled Internet of Things Communication: Issues: Challenges, and Future Research Roadmap

    Get PDF
    5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work

    5G και IoT και σύγχρονες εφαρμογές

    Get PDF
    Η παρούσα εργασία ασχολείται με το ΙοΤ με δυνατότητα 5G. Αρχικά στην εργασία γίνεται αναφορά στην ιστορική εξέλιξη του 5G. Ακολουθεί αναφορά στην τεχνολογία 5G, όπου αναφέρονται τα χαρακτηριστικά του 5G, τα οφέλη της τεχνολογίας 5G και παρουσιάζονται αναλυτικά οι τεχνολογίες για αλληλεπίδραση με ΙοΤ. Επίσης, γίνεται περιγραφή της τεχνολογίας ΙοΤ, όπου αποτυπώνονται οι προκλήσεις και τα χαρακτηριστικά του ΙοΤ, οι τεχνολογίες IoT και οι τεχνολογίες για αλληλεπίδραση με 5G. Ακολουθεί εκτενής αναφορά στην αρχιτεκτονική του συστήματος 5G - IoT, καθώς και στις απαιτήσεις ασφαλείας και τις πιθανές επιθέσεις σε επικοινωνία IoT με δυνατότητα. Στη συνέχεια, αναφέρονται τα υπάρχοντα πρωτόκολλα ασφαλείας σε περιβάλλον επικοινωνιών IoT με δυνατότητα 5G. Η εργασία ολοκληρώνεται με αναφορά στο υφιστάμενο εμπορικό πλαίσιο του 5G στην παγκόσμια βιομηχανία, αλλά και με ιδιαίτερη αναφορά στις μελλοντικές προκλήσεις της τεχνολογίας που μελετήθηκε.The present work deals with IoT with 5G capability. Initially, the work refers to the historical development of 5G. The following is a reference to 5G technology, which mentions the features of 5G, the benefits of 5G technology and presents in detail the technologies for interaction with IoT. It also describes IoT technology, which captures the challenges and features of IoT, IoT technologies and technologies for 5G interaction. The following is an extensive reference to the 5G - IoT system architecture, as well as security requirements and possible attacks on IoT communication capabilities. The following is a list of existing security protocols in a 5G IoT communication environment. The work concludes with a reference to the current commercial context of 5G in the global industry, but also with a special reference to the future challenges of the technology studied
    corecore