Abstract
Fifth generation (5G) wireless technologies satisfies the growing demand for the Internet of Things (IoT), however, IoT devices are vulnerable to security threats due to the simplicity of their hardware and communication protocols, which imply possible attacks and security challenges. In this work we propose to conduct a systematic review of literature that relates 5G technologies to the internet of things and approach the security that the 5G network for IoT must provide. The Torres – Carrión method is used, raising four research questions: a) information security services, b) types of attacks in 5G-IoT, c) security in the layers of the IoT network architecture, d) strategies for 5G-IoT network security. Semantic search criteria were applied, in the Scopus database, obtaining 23 articles from 18 journals, the main studies were collected, it is evident that the blockchain is an efficient security mechanism that merits further study, that the physical layer is the one that receives the most active and passive attacks, such as denial of service (DoS) that is studied by several authors, together with mechanisms, architectures, protocols and algorithms that provide the security services of a mobile network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Amiruddin, A., Ratna, A.A.P., Sari, R.F.: Systematic review of internet of things security. Int. J. Commun. Networks Inf. Secur. 11, 248–255 (2019)
Zhang, S., Wang, Y., Zhou, W.: Towards secure 5G networks: a survey. Comput. Networks. 162, 106871 (2019). https://doi.org/10.1016/j.comnet.2019.106871
Gafurov, K., Chung, T.M.: Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J. Inf. Process. Syst. 15, 797–819 (2019). https://doi.org/10.3745/JIPS.03.0125
Stallings, W.: Cryptography and Network Security Principles and practice, 5th edn. Prentice Hall, Upper Saddle River (2011)
Calder, A.: Information Security based on ISO 27001/ISO 27002. van Haren Publishing, Hertogenbosch (2009)
Torres-Carrion, P.V., Gonzalez-Gonzalez, C.S., Aciar, S., Rodriguez-Morales, G.: Methodology for systematic literature review applied to engineering and education. In: IEEE Global Engineering Education Conference, EDUCON, pp. 1364–1373. IEEE Computer Society (2018)
Gurusamy, D., Deva Priya, M., Yibgeta, B., Bekalu, A.: DDoS risk in 5G enabled iot and solutions. Int. J. Eng. Adv. Technol. 8, 1574–1578 (2019)
Li, S., Xu, L. Da, Zhao, S.: 5G Internet of Things: A survey (2018). https://linkinghub.elsevier.com/retrieve/pii/S2452414X18300037
Liyanage, M., Ahmad, I., Abro, A.B., Gurtov, A., Ylianttila, M.: A Comprehensive Guide to 5G Security. Wiley, Hoboken (2018)
Iso.org: ISO/IEC 30141:2018(en), Internet of Things (loT)—Reference Architecture. https://www.iso.org/obp/ui/es/#iso:std:iso-iec:30141:ed-1:v1:en
thesaurus.com: Thesaurus. https://www.thesaurus.com
Wang, H.: IEEE Internet Things J. https://ieeexplore.ieee.org/xpl/aboutJournal.jsp?punumber=6488907
Romero Castro, M.I., Figueroa Morán, G.L., Vera Navarrete, D.S., Álava Cruzatty, J.E., Parrales Anzúles, G.R., Álava Mero, C.J., Murillo Quimiz, Á.L., Castillo Merino, M.A.: Introducción a la seguridad informática y el análisis de vulnerabilidades (2018)
Chaudhuri, A.: Internet of Things, for Things, and by Things. CRC Press, Boca Raton (2018)
UIT: La seguridad de las telecomunicaciones y las tecnologías de la información. 136 (2006)
Ouaissa, M., Ouaissa, M., Rhattoy, A.: An efficient and secure authentication and key agreement protocol of LTE mobile network for an IoT system. Int. J. Intell. Eng. Syst. 12, 212–222 (2019). https://doi.org/10.22266/ijies2019.0831.20
Heigl, M., Doerr, L., Tiefnig, N., Fiala, D., Schramm, M.: A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection. Comput. Secur. 85, 270–287 (2019). https://doi.org/10.1016/j.cose.2019.05.010
Fang, D., Qian, Y., Hu, R.Q.: Security for 5G mobile wireless networks. IEEE Access. 6, 4850–4874 (2017). https://doi.org/10.1109/ACCESS.2017.2779146
Militano, L., Orsino, A., Araniti, G., Iera, A.: NB-IoT for D2D-enhanced content uploading with social trustworthiness in 5G systems. Fut. Internet. 9, 31 (2017). https://doi.org/10.3390/fi9030031
Santos, A.L., Cervantes, C.A.V., Nogueira, M., Kantarci, B.: Clustering and reliability-driven mitigation of routing attacks in massive IoT systems. J. Internet Serv. Appl. 10, 18 (2019). https://doi.org/10.1186/s13174-019-0117-8
Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., Zeng, K.: Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J. 6, 8169–8181 (2019). https://doi.org/10.1109/JIOT.2019.2927379
Nieto, A., Acien, A., Fernandez, G.: Crowdsourcing analysis in 5G IoT: cybersecurity threats and mitigation. Mob. Networks Appl. 24, 881–889 (2019). https://doi.org/10.1007/s11036-018-1146-4
Cao, J., Yu, P., Ma, M., Gao, W.: Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J. 6, 1561–1575 (2019). https://doi.org/10.1109/JIOT.2018.2846803
Xu, L., Chen, J., Liu, M., Wang, X.: Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8, 146 (2019). https://doi.org/10.3390/electronics8020146
Sharma, V., You, I., Leu, F.Y., Atiquzzaman, M.: Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J. Netw. Comput. Appl. 102, 38–57 (2018). https://doi.org/10.1016/j.jnca.2017.11.004
Arul, R., Raja, G., Almagrabi, A.O., Alkatheiri, M.S., Chauhdary, S.H., Bashir, A.K.: A quantum-safe key hierarchy and dynamic security association for LTE/SAE in 5G scenario. IEEE Trans. Ind. Informatics. 16, 681–690 (2020). https://doi.org/10.1109/TII.2019.2949354
Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the Internet of Things. Secur. Commun. Networks. 9, 3083–3094 (2016). https://doi.org/10.1002/sec.1259
Safkhani, M., Shariat, M.: Implementation of secret disclosure attack against two IoT lightweight authentication protocols. J. Supercomput. 74, 6220–6235 (2018). https://doi.org/10.1007/s11227-018-2538-8
Salva-Garcia, P., Alcaraz-Calero, J.M., Wang, Q., Bernabe, J.B., Skarmeta, A.: 5G NB-IoT: efficient network traffic filtering for multitenant IoT cellular networks. Secur. Commun. Netw. 2018, 1–21 (2018). https://doi.org/10.1155/2018/9291506
Fu, Y., Yan, Z., Cao, J., Koné, O., Cao, X.: An automata based intrusion detection method for Internet of Things. Mob. Inf. Syst. 2017, 1–13 (2017). https://doi.org/10.1155/2017/1750637
Zhang, S., Xu, X., Peng, J., Huang, K., Li, Z.: Physical layer security in massive internet of things: delay and security analysis. IET Commun. 13, 93–98 (2019). https://doi.org/10.1049/iet-com.2018.5570
Memon, M.L., Saxena, N., Roy, A., Shin, D.R.: Backscatter communications: inception of the battery-free era—a comprehensive survey. Electronics 8, 2–129 (2019). https://doi.org/10.3390/electronics8020129
Dai, H.N., Zheng, Z., Zhang, Y.: Blockchain for Internet of Things: a survey. IEEE Internet Things J. 6, 8076–8094 (2019). https://doi.org/10.1109/JIOT.2019.2920987
Ni, J., Lin, X., Shen, X.S.: Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36, 644–657 (2018). https://doi.org/10.1109/JSAC.2018.2815418
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Montaño-Blacio, M., Briceño-Sarmiento, J., Pesántez-Bravo, F. (2021). 5G Network Security for IoT Implementation: A Systematic Literature Review. In: Botto-Tobar, M., Zambrano Vizuete, M., Díaz Cadena, A. (eds) Innovation and Research. CI3 2020. Advances in Intelligent Systems and Computing, vol 1277. Springer, Cham. https://doi.org/10.1007/978-3-030-60467-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-60467-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60466-0
Online ISBN: 978-3-030-60467-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)