iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-031-29056-5_48
Security Challenges and Recommendations in 5G-IoT Scenarios | SpringerLink
Skip to main content

Security Challenges and Recommendations in 5G-IoT Scenarios

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2023)

Abstract

The fifth-generation (5G) mobile communication systems are already a reality. This communication technology can increase and simplify the adoption of the Internet of Things (IoT) applications (e.g., industrial IoT), given that it will provide the means to connect up to one million devices in a squared kilometer. Many of these applications can generate sensitive data, which requires the adoption of security mechanisms, and these mechanisms must consider the computational limitations of the devices. Considering that IoT devices under security attacks can access the 5G infrastructure, this paper presents recommendations and challenges regarding security in IoT devices. It also presents a threat model and a few common attacks, classifying them with the STRIDE model and CVSS and discussing how they can impact the 5G infrastructure .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ambareen, J., Prabhakar, M., Ara, T.: LEES: a hybrid lightweight elliptic ElGamal-Schnorr-based cryptography for secure D2D communications. J. Telecommun. Inf. Technol. 2, 24–30 (2021)

    Google Scholar 

  2. Celik, A., Tetzner, J., Sinha, K., Matta, J.: 5G device-to-device communication security and multipath routing solutions. Appl. Netw. Sci. 4(1), 1–24 (2019)

    Article  Google Scholar 

  3. Chen, S., Ma, R., Chen, H.H., Zhang, H., Meng, W., Liu, J.: Machine-to-machine communications in ultra-dense networks - a survey. IEEE Commun. Surv. Tutor. 19(3), 1478–1503 (2017)

    Article  Google Scholar 

  4. ENISA: Baseline security recommendations for IoT in the context of critical information infrastructures. Technical report, ENISA (2017)

    Google Scholar 

  5. ETSI: EN 303 645 - cyber security for consumer Internet of Things: Baseline requirements. Technical report, ETSI (2020)

    Google Scholar 

  6. European Commission: Proposal for a Regulation of the European Parliament and of the Council on Horizontal Cybersecurity Requirements for Products with Digital Elements and Amending Regulation (EU) 2019/1020 (2022)

    Google Scholar 

  7. Fagan, M., Megas, K., Scarfone, K., Smith, M.: Foundational cybersecurity activities for IoT device manufacturers. Technical report, NIST (2020)

    Google Scholar 

  8. Figueroa-Lorenzo, S., Añorga, J., Arrizabalaga, S.: A survey of IIoT protocols: a measure of vulnerability risk analysis based on CVSS. ACM Comput. Surv. 53(2), 1–53 (2020)

    Article  Google Scholar 

  9. Pub, F.I.P.S.: Standards for Security Categorization of Federal Information and Information Systems. Federal Information Processing Standards Publication, Gaithersburg, MD, USA (2004)

    Google Scholar 

  10. Hou, F., Wang, Z., Tang, Y., Liu, Z.: Protecting integrity and confidentiality for data communication. In: International Symposium on Computers and Communications. IEEE, Alexandria (2004)

    Google Scholar 

  11. ITU-T - Telecommunication Standardization Sector of ITU: Overview of the Internet of Things (2012)

    Google Scholar 

  12. Hojlo, J.: Future of industry ecosystems: shared data and insights. IDC (2021)

    Google Scholar 

  13. Jung, Y., Agulto, R.: Virtual IP-based secure gatekeeper system for internet of things. Sensors 21(1), 38 (2021)

    Article  Google Scholar 

  14. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)

    Book  MATH  Google Scholar 

  15. Kwon, S., Park, S., Cho, H., Park, Y., Kim, D., Yim, K.: Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing 103(3), 425–447 (2021)

    Article  Google Scholar 

  16. Li, S., Xu, L.D., Zhao, S.: 5G Internet of things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018)

    Google Scholar 

  17. Li, X., Liu, S., Wu, F., Kumari, S., Rodrigues, J.J.P.C.: Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 6(3), 4755–4763 (2019)

    Article  Google Scholar 

  18. Lopes, A.P.G., Hilgert, L.O., Gondim, P.R., Lloret, J.: Secret sharing-based authentication and key agreement protocol for machine-type communications. Int. J. Distrib. Sens. Netw. 15(4) (2019)

    Google Scholar 

  19. Mogadem, M.M., Li, Y., Meheretie, D.L.: A survey on internet of energy security: related fields, challenges, threats and emerging technologies. Cluster Comput. 25(4), 1–37 (2021)

    Google Scholar 

  20. Mohammad Hasan: State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally (2022). https://iot-analytics.com/number-connected-iot-devices

  21. Mostefa, B., Abdelkader, G.: A survey of wireless sensor network security in the context of internet of things. In: International Conference on Information and Communication Technologies for Disaster Management, pp. 1–8. IEEE, Münster (2017)

    Google Scholar 

  22. Mrabet, H., Belguith, S., Alhomoud, A., Jemai, A.: A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13), 3625 (2020)

    Article  Google Scholar 

  23. Ogbodo, E.U., Abu-Mahfouz, A.M., Kurien, A.M.: A survey on 5G and LPWAN-IoT for improved smart cities and remote area applications: from the aspect of architecture and security. Sensors 22(16), 6313 (2022)

    Article  Google Scholar 

  24. Oyj, N.: Nokia deepfield network intelligence report DDoS in 2021. Technical report, Nokia (2022)

    Google Scholar 

  25. Qadri, Y.A., Ali, R., Musaddiq, A., Al-Turjman, F., Kim, D.W., Kim, S.W.: The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Cluster Comput. 23(3), 2047–2065 (2020)

    Article  Google Scholar 

  26. Rahimi, H., Zibaeenejad, A., Rajabzadeh, P., Safavi, A.A.: On the security of the 5G-IoT architecture. In: International Conference on Smart Cities and Internet of Things. ACM, Mashhad (2018)

    Google Scholar 

  27. Ramezan, G., Leung, C., Wang, Z.J.: A survey of secure routing protocols in multi-hop cellular networks. IEEE Commun. Surv. Tutor. 20(4), 3510–3541 (2018)

    Article  Google Scholar 

  28. Saleem, K., Alabduljabbar, G.M., Alrowais, N., Al-Muhtadi, J., Imran, M., Rodrigues, J.J.P.C.: Bio-inspired network security for 5G-enabled IoT applications. IEEE Access 8, 229152–229160 (2020)

    Google Scholar 

  29. Salim, M.M., Rathore, S., Park, J.H.: Distributed denial of service attacks and its defenses in IoT: a survey. J. Supercomput. 76(7), 5320–5363 (2019)

    Article  Google Scholar 

  30. Sankar, S.P., Subash, T.D., Vishwanath, N., Geroge, D.E.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. Peer Peer Netw. Appl. 14(1), 392–402 (2020)

    Article  Google Scholar 

  31. Sathish, C., Rubavathi, C.Y.: A survey on blockchain mechanisms (BCM) based on internet of things (IoT) applications. Multimed. Tools Appl. 81(23), 33419–33458 (2022)

    Article  Google Scholar 

  32. Sharma, P., Jain, S., Gupta, S., Chamola, V.: Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 123, 102685 (2021)

    Article  Google Scholar 

  33. Sicari, S., Rizzardi, A., Coen-Porisini, A.: 5G in the internet of things era: an overview on security and privacy challenges. Comput. Netw. 179, 107345 (2020)

    Article  Google Scholar 

  34. Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2004)

    Google Scholar 

  35. Taimoor, N., Rehman, S.: Reliable and resilient AI and IoT-based personalised healthcare services: a survey. IEEE Access 10, 535–563 (2022)

    Article  Google Scholar 

  36. Tara Seals: IoT Attacks Skyrocket, Doubling in 6 Months. Threat Post (2021)

    Google Scholar 

  37. Uddin, H., et al.: IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars. In: International Workshop on Computer Aided Modeling and Design of Communication Links and Networks. IEEE, Limassol (2019)

    Google Scholar 

  38. Ur-Rehman, A., Gondal, I., Kamruzzuman, J., Jolfaei, A.: Vulnerability modelling for hybrid IT systems. In: International Conference on Industrial Technology. IEEE, Melbourne (2019)

    Google Scholar 

  39. U.S. Government Publishing Office: H.R.1668 - IoT Cybersecurity Improvement Act of 2020 (2020)

    Google Scholar 

  40. Vangala, A., Das, A.K., Chamola, V., Korotaev, V., Rodrigues, J.J.P.C.: Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Cluster Comput., 1–24 (2022)

    Google Scholar 

  41. Varga, P., et al.: 5G support for industrial IoT applications - challenges, solutions, and research gaps. Sensors 20(3), 828 (2020)

    Article  Google Scholar 

  42. Wazid, M., Das, A.K., Shetty, S., Gope, P., Rodrigues, J.J.P.C.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2021)

    Article  Google Scholar 

  43. Zhang, H., Sakurai, K.: A survey of software clone detection from security perspective. IEEE Access 9, 48157–48173 (2021)

    Article  Google Scholar 

  44. Šarac, M., Pavlović, N., Bacanin, N., Al-Turjman, F., Adamović, S.: Increasing privacy and security by integrating a blockchain secure interface into an IoT device security gateway architecture. Energy Rep. 7, 8075–8082 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

We thank the National Telecommunications Agency (Agência Nacional de Telecomunicações - ANATEL) for supporting this research. We also thank the Virtus Research, Development and Innovation Center and Embedded and Pervasive Computing Laboratory, Federal University of Campina Grande.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dalton C. G. Valadares .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Valadares, D.C.G., Will, N.C., Sobrinho, Á.Á.C.C., Lima, A.C.D., Morais, I.S., Santos, D.F.S. (2023). Security Challenges and Recommendations in 5G-IoT Scenarios. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 661. Springer, Cham. https://doi.org/10.1007/978-3-031-29056-5_48

Download citation

Publish with us

Policies and ethics