Abstract
The fifth-generation (5G) mobile communication systems are already a reality. This communication technology can increase and simplify the adoption of the Internet of Things (IoT) applications (e.g., industrial IoT), given that it will provide the means to connect up to one million devices in a squared kilometer. Many of these applications can generate sensitive data, which requires the adoption of security mechanisms, and these mechanisms must consider the computational limitations of the devices. Considering that IoT devices under security attacks can access the 5G infrastructure, this paper presents recommendations and challenges regarding security in IoT devices. It also presents a threat model and a few common attacks, classifying them with the STRIDE model and CVSS and discussing how they can impact the 5G infrastructure .
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ambareen, J., Prabhakar, M., Ara, T.: LEES: a hybrid lightweight elliptic ElGamal-Schnorr-based cryptography for secure D2D communications. J. Telecommun. Inf. Technol. 2, 24–30 (2021)
Celik, A., Tetzner, J., Sinha, K., Matta, J.: 5G device-to-device communication security and multipath routing solutions. Appl. Netw. Sci. 4(1), 1–24 (2019)
Chen, S., Ma, R., Chen, H.H., Zhang, H., Meng, W., Liu, J.: Machine-to-machine communications in ultra-dense networks - a survey. IEEE Commun. Surv. Tutor. 19(3), 1478–1503 (2017)
ENISA: Baseline security recommendations for IoT in the context of critical information infrastructures. Technical report, ENISA (2017)
ETSI: EN 303 645 - cyber security for consumer Internet of Things: Baseline requirements. Technical report, ETSI (2020)
European Commission: Proposal for a Regulation of the European Parliament and of the Council on Horizontal Cybersecurity Requirements for Products with Digital Elements and Amending Regulation (EU) 2019/1020 (2022)
Fagan, M., Megas, K., Scarfone, K., Smith, M.: Foundational cybersecurity activities for IoT device manufacturers. Technical report, NIST (2020)
Figueroa-Lorenzo, S., Añorga, J., Arrizabalaga, S.: A survey of IIoT protocols: a measure of vulnerability risk analysis based on CVSS. ACM Comput. Surv. 53(2), 1–53 (2020)
Pub, F.I.P.S.: Standards for Security Categorization of Federal Information and Information Systems. Federal Information Processing Standards Publication, Gaithersburg, MD, USA (2004)
Hou, F., Wang, Z., Tang, Y., Liu, Z.: Protecting integrity and confidentiality for data communication. In: International Symposium on Computers and Communications. IEEE, Alexandria (2004)
ITU-T - Telecommunication Standardization Sector of ITU: Overview of the Internet of Things (2012)
Hojlo, J.: Future of industry ecosystems: shared data and insights. IDC (2021)
Jung, Y., Agulto, R.: Virtual IP-based secure gatekeeper system for internet of things. Sensors 21(1), 38 (2021)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)
Kwon, S., Park, S., Cho, H., Park, Y., Kim, D., Yim, K.: Towards 5G-based IoT security analysis against Vo5G eavesdropping. Computing 103(3), 425–447 (2021)
Li, S., Xu, L.D., Zhao, S.: 5G Internet of things: a survey. J. Ind. Inf. Integr. 10, 1–9 (2018)
Li, X., Liu, S., Wu, F., Kumari, S., Rodrigues, J.J.P.C.: Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 6(3), 4755–4763 (2019)
Lopes, A.P.G., Hilgert, L.O., Gondim, P.R., Lloret, J.: Secret sharing-based authentication and key agreement protocol for machine-type communications. Int. J. Distrib. Sens. Netw. 15(4) (2019)
Mogadem, M.M., Li, Y., Meheretie, D.L.: A survey on internet of energy security: related fields, challenges, threats and emerging technologies. Cluster Comput. 25(4), 1–37 (2021)
Mohammad Hasan: State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally (2022). https://iot-analytics.com/number-connected-iot-devices
Mostefa, B., Abdelkader, G.: A survey of wireless sensor network security in the context of internet of things. In: International Conference on Information and Communication Technologies for Disaster Management, pp. 1–8. IEEE, Münster (2017)
Mrabet, H., Belguith, S., Alhomoud, A., Jemai, A.: A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13), 3625 (2020)
Ogbodo, E.U., Abu-Mahfouz, A.M., Kurien, A.M.: A survey on 5G and LPWAN-IoT for improved smart cities and remote area applications: from the aspect of architecture and security. Sensors 22(16), 6313 (2022)
Oyj, N.: Nokia deepfield network intelligence report DDoS in 2021. Technical report, Nokia (2022)
Qadri, Y.A., Ali, R., Musaddiq, A., Al-Turjman, F., Kim, D.W., Kim, S.W.: The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Cluster Comput. 23(3), 2047–2065 (2020)
Rahimi, H., Zibaeenejad, A., Rajabzadeh, P., Safavi, A.A.: On the security of the 5G-IoT architecture. In: International Conference on Smart Cities and Internet of Things. ACM, Mashhad (2018)
Ramezan, G., Leung, C., Wang, Z.J.: A survey of secure routing protocols in multi-hop cellular networks. IEEE Commun. Surv. Tutor. 20(4), 3510–3541 (2018)
Saleem, K., Alabduljabbar, G.M., Alrowais, N., Al-Muhtadi, J., Imran, M., Rodrigues, J.J.P.C.: Bio-inspired network security for 5G-enabled IoT applications. IEEE Access 8, 229152–229160 (2020)
Salim, M.M., Rathore, S., Park, J.H.: Distributed denial of service attacks and its defenses in IoT: a survey. J. Supercomput. 76(7), 5320–5363 (2019)
Sankar, S.P., Subash, T.D., Vishwanath, N., Geroge, D.E.: Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. Peer Peer Netw. Appl. 14(1), 392–402 (2020)
Sathish, C., Rubavathi, C.Y.: A survey on blockchain mechanisms (BCM) based on internet of things (IoT) applications. Multimed. Tools Appl. 81(23), 33419–33458 (2022)
Sharma, P., Jain, S., Gupta, S., Chamola, V.: Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 123, 102685 (2021)
Sicari, S., Rizzardi, A., Coen-Porisini, A.: 5G in the internet of things era: an overview on security and privacy challenges. Comput. Netw. 179, 107345 (2020)
Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2004)
Taimoor, N., Rehman, S.: Reliable and resilient AI and IoT-based personalised healthcare services: a survey. IEEE Access 10, 535–563 (2022)
Tara Seals: IoT Attacks Skyrocket, Doubling in 6 Months. Threat Post (2021)
Uddin, H., et al.: IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars. In: International Workshop on Computer Aided Modeling and Design of Communication Links and Networks. IEEE, Limassol (2019)
Ur-Rehman, A., Gondal, I., Kamruzzuman, J., Jolfaei, A.: Vulnerability modelling for hybrid IT systems. In: International Conference on Industrial Technology. IEEE, Melbourne (2019)
U.S. Government Publishing Office: H.R.1668 - IoT Cybersecurity Improvement Act of 2020 (2020)
Vangala, A., Das, A.K., Chamola, V., Korotaev, V., Rodrigues, J.J.P.C.: Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. Cluster Comput., 1–24 (2022)
Varga, P., et al.: 5G support for industrial IoT applications - challenges, solutions, and research gaps. Sensors 20(3), 828 (2020)
Wazid, M., Das, A.K., Shetty, S., Gope, P., Rodrigues, J.J.P.C.: Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9, 4466–4489 (2021)
Zhang, H., Sakurai, K.: A survey of software clone detection from security perspective. IEEE Access 9, 48157–48173 (2021)
Šarac, M., Pavlović, N., Bacanin, N., Al-Turjman, F., Adamović, S.: Increasing privacy and security by integrating a blockchain secure interface into an IoT device security gateway architecture. Energy Rep. 7, 8075–8082 (2021)
Acknowledgements
We thank the National Telecommunications Agency (Agência Nacional de Telecomunicações - ANATEL) for supporting this research. We also thank the Virtus Research, Development and Innovation Center and Embedded and Pervasive Computing Laboratory, Federal University of Campina Grande.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Valadares, D.C.G., Will, N.C., Sobrinho, Á.Á.C.C., Lima, A.C.D., Morais, I.S., Santos, D.F.S. (2023). Security Challenges and Recommendations in 5G-IoT Scenarios. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 661. Springer, Cham. https://doi.org/10.1007/978-3-031-29056-5_48
Download citation
DOI: https://doi.org/10.1007/978-3-031-29056-5_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29055-8
Online ISBN: 978-3-031-29056-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)