Ensuring Security in 4G and 5G Mobile Networks: Challenges and Solutions

Ensuring Security in 4G and 5G Mobile Networks: Challenges and Solutions

Author: (wan0079 Yiming Wang)

Introduction:

With the advent of the 5th generation (5G) of mobile networks, there has been much discussion about the security implications of this new technology. 5G is designed to provide faster download and upload speeds, lower latency, and more capacity than its predecessor, 4G. However, these new capabilities also bring new security challenges that need to be addressed to ensure the safety of users and their data.
In this article, we will explore the security concerns surrounding 4G and 5G mobile networks. We will discuss the different types of threats that these networks face, and examine the measures that are being taken to address these threats. We will also look at the role of governments, mobile network operators, and individual users in ensuring the security of these networks.
Threats to Mobile Networks:
Mobile networks face a range of security threats, including hacking, malware, and phishing attacks. Hackers can exploit vulnerabilities in the network infrastructure, such as the base stations and routers, to gain unauthorized access to user data. Malware can be downloaded onto a user’s device through a malicious app or website, allowing attackers to steal personal information or control the device remotely. Phishing attacks involve tricking users into revealing their login credentials or other sensitive information through fake emails or websites.
These threats are not new to mobile networks, but the increased speed and capacity of 5G networks make them more vulnerable than ever before. With 5G, there will be more devices connected to the network, and these devices will be able to transmit and receive data much faster than before. This means that there will be more data flowing through the network, which creates more opportunities for attackers to exploit vulnerabilities.
在这里插入图片描述

Measures to Address Threats:
To address these threats, mobile network operators are implementing a range of security measures. These measures include encryption, network segmentation, and intrusion detection systems. Encryption involves encoding data so that it cannot be read by unauthorized parties. Network segmentation involves dividing the network into smaller sections, so that if one section is compromised, the rest of the network remains secure. Intrusion detection systems monitor the network for suspicious activity and alert network administrators if any threats are detected.
Governments are also taking steps to ensure the security of mobile networks. In some countries, mobile network operators are required to comply with government regulations that mandate certain security standards. For example, in the United States, the Federal Communications Commission (FCC) requires mobile network operators to implement security measures to protect against unauthorized access to user data.
Individual users also play a role in ensuring the security of mobile networks. Users can protect their devices by using strong passwords, installing security software, and avoiding suspicious websites and apps. Users should also be cautious when connecting to public Wi-Fi networks, as these networks may not be secure and can be used by attackers to intercept user data.

In conclusion, 4G and 5G mobile networks face a range of security threats that need to be addressed to ensure the safety of users and their data. Mobile network operators, governments, and individual users all have a role to play in addressing these threats. By implementing security measures, complying with government regulations, and taking personal responsibility for device security, we can ensure that our mobile networks remain safe and secure in the 5G era.

Specific description of 5G and 4G technology

4G technology mainly includes three parts: mobile communication network, mobile terminal equipment and mobile application services. The mobile communication network is mainly composed of base stations, core networks, and operator servers. Among them, base stations are responsible for communicating with mobile terminal devices, and core networks provide services such as user certification, billing, location management and data transmission. Mobile terminal devices include mobile phones, tablets and other smart terminals, which can communicate and data transmission through wireless networks. Mobile application services include various applications and services, such as social media, online shopping, games and videos.
5G technology is also composed of three parts: mobile communication network, mobile terminal equipment and mobile application services. The mobile communication network includes 5G base stations and core networks. Among them, 5G base stations use higher frequency millimeter wave and beam forming technology, providing higher -speed and lower delayed communication services. The core network provides more efficient, safer and smarter Data management and transmission services. Mobile terminal devices use more efficient, more intelligent chips and more advanced signal processing technologies to support more number of connections and more complex application scenarios. Mobile application services provide more services such as augmented reality, virtual reality, and the Internet of Things to meet people’s demand for richer and smarter digital experiences.
The security of 4G and 5G mobile networks is a rapidly evolving area of research and technological development. In recent years, there has been a growing concern about the security implications of these networks, given their increasing importance in our daily lives. As a result, researchers and developers are working to identify and address potential security vulnerabilities in these networks.One of the key areas of research is in the development of encryption technologies. Encryption is essential for protecting data transmitted over mobile networks from unauthorized access. While encryption has been used in mobile networks for many years, new encryption techniques are being developed to improve the security of 5G networks. For example, the 5G standard includes the use of a new encryption algorithm called ZUC, which is designed to provide stronger encryption and greater security than previous algorithms.
In the past, mobile communication networks were dominated by phone calls and data transfer requirements while a few years ago, emails, web pages, data files and applications dominated these networks. Furthermore, outdoor and mobile UEs are considered as a significant proportion of users that required to be attached to the internet everywhere at any
time. This has led to huge growth in the amount of data while network operators are trying to
transfer this data across mobile communication networks and meet all the users’ needs.
Therefore, network operators had to increase the mobile communication networks capacity by improving the used technology, so information between mobile phones and BSs can be transmitted and received faster than ever before. This means that the main drive behind the introduction of LTE is a change in mobile communication technology, so that it runs faster and reaches UEs faster to achieve higher data transfer rates and higher capacity.
Through years, mobile phones have gone through several generations like; 1G, 2G, 3G, 4G
and now under research is the 5G networks. The first generation of mobile phones were the large analogue mobile phones from 1980s while the mobile phones became more popular with the second generation in the 1990s. This brought with it the introduction of Global System for Mobile communications (GSM), which was the first mobile communication device even though it could only handle phone calls and text messages. The General Packet Radio Service (GPRS) (2.5G) enhanced the 2G phones by adding data to the previous voice and Short Message Service (SMS). The design of GSM however, did notAnother area of research is in the development of artificial intelligence (AI) and machine learning (ML) technologies to detect and respond to security threats. AI and ML can be used to analyze network traffic and identify anomalous patterns that may indicate a security breach. These technologies can also be used to automatically respond to threats by blocking suspicious traffic or alerting network administrators.[1]
In addition, network segmentation is being used to improve the security of 5G networks. Network segmentation involves dividing the network into smaller sections, or “slices”, so that if one slice is compromised, the rest of the network remains secure. This approach can help to limit the impact of security breaches and prevent attackers from gaining access to sensitive data.Governments and industry bodies are also playing a role in the development of security technologies for 4G and 5G networks. For example, the European Union’s 5G Cybersecurity Toolbox provides guidelines for ensuring the security of 5G networks. The toolbox includes recommendations for risk assessments, threat intelligence sharing, and incident response planning.Overall, while the security of 4G and 5G mobile networks remains an ongoing concern, researchers and developers are making significant progress in identifying and addressing potential vulnerabilities. Encryption technologies, AI and ML, network segmentation, and government guidelines are all contributing to a more secure mobile network ecosystem.Despite these developments, however, there are still several challenges that need to be addressed in order to ensure the security of 4G and 5G mobile networks. One of the biggest challenges is the sheer complexity of these networks. 5G networks, in particular, are highly complex and require advanced security measures to protect against threats.

Another challenge is the sheer volume of data that is transmitted over these networks. With the increasing popularity of mobile devices and the growth of the Internet of Things (IoT), the amount of data transmitted over mobile networks is growing rapidly. This creates a large attack surface that can be exploited by attackers.
In addition, the deployment of 5G networks presents unique security challenges. 5G networks use a variety of new technologies, such as network slicing and virtualization, which can introduce new security vulnerabilities. Furthermore, the increased use of cloud-based services in 5G networks can also increase the risk of data breaches.
在这里插入图片描述

To address these challenges, researchers and developers are exploring a range of new security technologies and approaches. For example, some researchers are investigating the use of blockchain technology to secure 5G networks. Blockchain can be used to create a decentralized and transparent system for managing network security, which could be particularly useful for ensuring the integrity of network transactions.Another approach that is being explored is the use of quantum cryptography. This technology uses quantum mechanics to provide an unbreakable encryption method, which could be used to secure sensitive data transmitted over mobile networks.
5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. [2]
Overall, while there are still challenges that need to be addressed, the ongoing research and development of security technologies for 4G and 5G mobile networks is promising. By continuing to identify and address potential vulnerabilities, researchers and developers can help to ensure that these networks are secure and reliable for users.

Attack types of 5G and 4G networks

On the Internet, 4G and 5G technology are facing various security threats and attacks. Common types of attacks include: eavesdropping, hijacking, deception, rejection of service, etc. These attacks will affect the user’s communication privacy and data security, which may cause network paralysis and system failure in severe cases.
In recent years, attack statistics show that attacks on 4G and 5G networks have shown an increasing trend. Among them, some more common types of attacks include:
1、IMSI-Catcher Attack: The attacker uses a fake base station to deceive users’ mobile devices to connect to the base station controlled by the attacker, thereby stealing the user’s mobile communication privacy.The IMSI-Catcher attack is an eavesdropper attack on mobile communication networks, also known as the Stingray attack. It uses a device called IMSI-Catcher (international mobile user identification code interceptor) to disguise it into a real mobile base station, which automatically connects the nearby mobile devices to this fake station and transmits communication data to the attacker
The IMSI-Catcher device will broadcast a signal similar to a real base station to attract the mobile device to the network connected to it. When the device is connected to the IMSI-Catcher, the attacker can steal communication data sent and received the device, such as call content, SMS, network traffic, etc. In addition, attackers can also use this method to steal important information such as IMSI and IMEI of the device.
IMSI-Catcher attacks are usually used to monitor communication activities of target users, such as spy activities and tracking criminal suspects. In addition, IMSI-Catcher can also be used to deceptive device connecting to fake base stations for more extensive attacks, such as deceiving users to enter personal sensitive information, stealing bank account passwords, etc.
In recent years, the IMSI-Catcher attack has been widely used in various fields, including the government, police, military, hackers, criminal organizations, etc. Here are some cases and statistical data of IMSI-Catcher attacks in recent years:
In 2017, the Federal Investigation Agency (FBI) disclosed that it had used the IMSI-Catcher device for investigation in the past 10 years. The FBI used about 400 IMSI-Catcher devices during this time, most of which were used to track the communication activities of the suspect.
In 2018, a hacker named “Demetrius” claimed to use the IMSI-Catcher in Washington Special Economic Zone to steal the communication data from government officials and upload these data to the Internet. This incident has attracted widespread attention and exposed the harmfulness of IMSI-Catcher attacking sensitive areas such as government and military.a report issued by German security researchers revealed the situation of many European countries using IMSI-Catcher devices. The police use the IMSI-Catcher device to steal mobile phone communication data and use the data to monitor the activities of the suspect. This incident once again attracted attention and concerns about IMSI-Catcher attacks.[3]
在这里插入图片描述

In general, the IMSI-Catcher attack is a very dangerous attack method that can steal the user’s sensitive information and track its activities. With the continuous development of mobile communication technology, the IMSI-Catcher attack is constantly upgrading and evolving. Therefore, it is very important to protect users’ communication privacy and security. A variety of technologies and measures need to be adopted to defend this attack.
2、DDOS attack: The attacker uses a large amount of data traffic and requests, making network services seriously disturb and refuse services.DDOS (Distributed Denial of Service) Attack means that the attacker sends a large number of requests or data traffic to the target server or network through controlling multiple computers or devices to make the target server or network overload, which cannot work normally or provides services, so as to make it allows services to make services. Legal users cannot access or use the server or network resources.DDOS attacks usually involve the following steps:
The attacker controls some computers or devices infected with malware. These computers or devices are usually called “zombie network” or “meat chicken”.
The attacker uses a controlled computer or device to send a large amount of requests or data packets on the target server or network to consume the resources and bandwidth of the target server or network.[4]
The target server or network overload cannot work normally or provides services, resulting in legal users who cannot access or use the server or network resources.
The attacker may use different attack methods and technologies, such as UDP Flood, TCP Syn Flood, HTTP Flood, etc., to maximize the resources and bandwidths of the target server or network.
DDOS attack is a very common method of attack, which can affect any organization and individuals using the Internet. According to the latest statistics, the frequency and scale of DDOS attacks are increasing. For example, a research in 2020 found that the average traffic of DDOS attacks reached 830 Gbps, which was more than twice that of 2019. In addition, the DDOS attack has gradually expanded to emerging fields such as mobile networks and the Internet of Things.
3、Wireless signal interference attack: The attacker uses wireless signal interference equipment to destroy the communication signal between the base station and the mobile device, making the network service unstable or completely interrupted.Wireless signal interference attacks can be attacked in the following ways:
FM jamming: An attacker can use a wireless transmitter to send a large number of unwanted noise signals, jamming the received signal of the receiver. This can result in reduced signal quality, preventing legitimate users from accessing the network.
Interrupting communications: An attacker can disrupt wireless communications using signal jamming devices such as RF jammers. This attack can impede communication by sending powerful electromagnetic signals in certain frequency bands, thereby affecting the functionality of affected devices.
Fake base station attack: An attacker can set up a fake base station (such as Stingray) to simulate a legitimate mobile base station signal. This can trick a device into connecting to a fake base station, allowing man-in-the-middle attacks or stealing sensitive information.
During the 2020 U.S. election campaign, reports emerged that foreign hackers may have used jammers to interfere with the U.S. government’s GPS system, potentially disrupting the navigation of drones, aircraft and ships.
During the 2019 Hong Kong opposition protests, there were reports that police used “IMSI catchers,” devices that jam and intercept communications signals, to track protesters’ locations and communications.
During the 2018 World Cup in Russia, reports emerged that the Russian government used advanced jamming equipment to prevent drones from invading the stadium.
4、Fishing attack: The attacker uses false applications or services to deceive users to enter sensitive information, thereby stealing important data such as account numbers and passwords of users.
Fake base station attack: An attacker can use a fake base station to simulate a real base station to trick users into connecting to the base station. The attacker can then intercept the user’s communication through the fake base station, steal sensitive information or provide false information to deceive the user.
Forged SMS attack: An attacker can forge a text message to trick a user into providing personal information.[6] For example, an attacker could send a text message that looks like it was sent by a bank, asking the user to enter their account information, which would allow the attacker to steal the user’s account information.
Malicious app attacks: Attackers can create malicious apps that mimic popular apps and distribute them through app stores. These apps often request users to provide personal information, when in reality they were developed by attackers to trick users into providing sensitive information.Fishing attack can be attacked in the following ways:
Eavesdropping Attacks: Attackers can exploit network vulnerabilities to eavesdrop on user communications. For example, attackers can exploit wireless network security gaps to intercept user communications and steal sensitive information.[7]
Malicious code attack: The attacker uses malware or virus to infect users’ mobile devices, steal the user’s privacy data or control the user’s equipment.[8]
In recent years, attacks on 4G and 5G networks have increased, especially the types and quantities of 5G networks have increased. For example, in June 2021, the British National Cyber Security Center issued a report saying that the Chinese government supports the Hacker APT40 with 4G and 5G networks to attack British government agencies, troops and high -tech companies. In addition, researchers have also discovered many other security vulnerabilities and attack methods, such as SIM card attacks, base station destruction, and operator server attacks. Therefore, the security of 4G and 5G networks is critical. Various technologies and measures are needed, including encryption technology, certification technology, security agreements, and network monitoring to ensure the security and reliability of the network.[9]
Mobile networks, particularly 4G and 5G, have become an integral part of our daily lives. With the increasing popularity of mobile devices, and the emergence of new technologies such as the Internet of Things (IoT), these networks have become more important than ever. However, this increased reliance on mobile networks has also raised concerns about their security.[11] As a result, there has been a growing focus on the development of security technologies for 4G and 5G networks.Mobile networks are vulnerable to a range of security threats, including data theft, eavesdropping, denial-of-service attacks, and malware infections. One of the main reasons for this vulnerability is the use of wireless communication, which can be intercepted and manipulated by attackers.
Data theft is one of the most significant security threats to 4G and 5G networks. With the increasing amount of sensitive data transmitted over these networks, including personal information, financial information, and corporate data, the risk of data theft is higher than ever. Attackers can steal data by intercepting network traffic, or by exploiting vulnerabilities in the network infrastructure.Eavesdropping is another major security threat to mobile networks. Attackers can intercept and listen in on network traffic, allowing them to access sensitive information such as passwords, credit card numbers, and other personal informati-n. Eavesdropping can be particularly effective in 4G and 5G networks, which use a range of wireless communication technologies that are vulnerable to interception.Denial-of-service (DoS) attacks are a third major security threat to mobile networks. In a DoS attack, attackers flood the network with traffic, causing it to become overloaded and unavailable to legitimate users. This type of attack can be particularly devastating in 4G and 5G networks, which are designed to handle large amounts of data traffic.[12]
Finally, malware infections are a common threat to mobile networks. Malware can be used to gain unauthorized access to network resources, steal data, or launch other attacks. In 4G a-nd 5G networks, malware can be spread through a range of channels, including email, social media, and other forms of communication.[13]
To address these security threats, researchers and developers are exploring a range of technological developments. One of the most significant of these is the use of encryption technologies. Encryption is essential for protecting data transmitted over mobile networks from unauthorized access. While encryption has been used in mobile networks for many years, new encryption techniques are being developed to improve the security of 5G networks. For example, the 5G standard includes the use of a new encryption algorithm called ZUC, which is designed to provide stronger encryption and greater security than previous algorithms.
在这里插入图片描述

Another important development is the use of artificial intelligence (AI) and machine learning (ML) technologies to detect and respond to security threats. AI and ML can be used to analyze network traffic and identify anomalous patterns that may indicate a security breach. These technologies can also be used to automatically respond to threats by blocking suspicious traffic or alerting network administrators.
Network segmentation is also being used to improve the security of 5G networks. Network segmentation involves dividing the network into smaller sections, or “slices”, so that if one slice is compromised, the rest of the network remains secure. This approach can help to limit the impact of security breaches and prevent attackers from gaining access to sensitive data.
Governments and industry bodies are also playing a role in the development of security technologies for4G and 5G networks. For example, in the United States, the National Institute of Standards and Technology (NIST) has developed a set of guidelines for securing mobile devices and networks, including 4G and 5G networks. These guidelines provide a framework for organizations to develop effective security strategies.
In addition, industry bodies such as the Global System for Mobile Communications (GSMA) are developing standards and guidelines for the security of 5G networks. These standards cover a range of areas, including network architecture, encryption, and authentication.
Mobile networks, particularly 4G and 5G networks, are vulnerable to a range of security threats, including data theft, eavesdropping, denial-of-service attacks, and malware infections.
To address these threats, researchers and developers are exploring a range of technological developments, including encryption, artificial intelligence and machine learning, and network segmentation. In addition, governments and industry bodies are playing a role in developing standards and guidelines for the security of 4G and 5G networks. With these developments, it is hoped that mobile networks will become more secure and better able to protect the sensitive data transmitted over them.
Fifth generation (5G) networks will form the future backbone of our societies and economies, connecting billions of objects and systems, including in critical sectors such as energy, transport, banking, and health, as well as industrial control systems carrying sensitive information and supporting safety systems. According to European Commission (EC), any vulnerability in 5G networks could be exploited in order to compromise such systems and digital infrastructure - potentially causing very serious damage or in order to conduct large-scale data theft or espionage. The dependence of many critical services on 5G networks would make the consequences of systemic and widespread disruption particularly serious.[3]

own points and possible contribution:

My points is that the use of advanced encryption and authentication protocols, security analytics and machine learning, and enhanced network segmentation and isolation. It will also be important to establish strong partnerships between network operators, device manufacturers, and security experts to ensure that all aspects of the network are secure.
Challenges and Solutions is a topic that is of great importance to many different stakeholders, including researchers, industry practitioners, government agencies, and the general public. Each of these groups has a unique perspective on the topic, and each can make important contributions to addressing the challenges and finding solutions.
From the perspective of researchers,Researchers can also contribute by developing new models for understanding the security risks posed by 4G and 5G networks. This includes developing new frameworks for analyzing threats and vulnerabilities, as well as new ways of testing and evaluating the effectiveness of security solutions.
From the perspective of industry practitioners, the challenge is to implement effective security strategies that can protect their networks and their customers’ data. This includes implementing strong encryption and authentication measures, as well as monitoring networks for unusual activity that may indicate a security breach.
Industry practitioners can also contribute by sharing best practices and collaborating on the development of new security standards and guidelines. This includes working with industry bodies such as the GSMA to develop new standards for 5G security, as well as collaborating with government agencies to develop new policies and regulations.
From the perspective of government agencies, the challenge is to ensure that 4G and 5G networks are secure and can be trusted for use in critical applications such as healthcare, finance, and national security. This includes developing policies and regulations that require network operators to implement strong security measures and to report security breaches to government agencies.
Government agencies can also contribute by investing in research and development programs that can help to address the unique security challenges posed by 4G and 5G networks. This includes funding research into new encryption and authentication techniques, as well as supporting the development of new standards and guidelines.
Finally, from the perspective of the general public, the challenge is to understand the security risks posed by 4G and 5G networks and to take steps to protect their own personal data. This includes being aware of the risks of using public Wi-Fi networks, avoiding downloading apps from untrusted sources, and being vigilant for signs of phishing attacks.
The general public can also contribute by advocating for stronger security measures and greater transparency in how their personal data is used and protected. This includes supporting government agencies and industry bodies in their efforts to develop new security standards and guidelines, as well as demanding greater accountability from network operators and service providers.
One important aspect of ensuring security in 4G and 5G mobile networks is the need to balance security with usability and convenience. While strong security measures can help to protect networks and data, they can also be cumbersome and difficult to use. This can lead to user frustration and may even result in users circumventing security measures altogether.
To address this challenge, researchers and industry practitioners are exploring new ways to make security more user-friendly and convenient. This includes developing new authentication methods, such as biometric authentication, that can provide strong security while also being easy and convenient for users to use.
Another important aspect of ensuring security in 4G and 5G mobile networks is the need to address the threat of insider attacks. Insider attacks occur when someone with legitimate access to a network or system uses that access to carry out a malicious attack. This can include employees of a network operator, service provider, or even a customer.
To address the threat of insider attacks, industry practitioners and government agencies are implementing a range of measures, including background checks, employee monitoring, and access controls. These measures can help to reduce the risk of insider attacks and provide a greater level of security for 4G and 5G networks.
Finally, another key challenge in ensuring security in 4G and 5G mobile networks is the need to address the threat of nation-state actors. Nation-state actors are state-sponsored groups that engage in cyber attacks for political or economic gain. These groups can have significant resources and capabilities, making them a particularly challenging threat to address.
To address the threat of nation-state actors, governments and industry practitioners are implementing a range of measures, including developing new encryption algorithms and implementing stronger authentication measures. They are also collaborating on the development of new standards and guidelines for network security, as well as investing in research and development programs to develop new technologies that can address the unique security challenges posed by nation-state actors.

Conclusion:

ensuring security in 4G and 5G mobile networks is a critical and ongoing challenge that requires constant attention and innovation. The use of new and emerging technologies, such as network slicing and virtualization, introduces new vulnerabilities that need to be addressed. Additionally, the scale of 5G networks and the increased use of IoT devices further complicates the security landscape.
To overcome these challenges, a variety of solutions have been proposed, including the use of advanced encryption and authentication protocols, security analytics and machine learning, and enhanced network segmentation and isolation. Collaboration between network operators, device manufacturers, and security experts will be crucial in achieving a secure and resilient 5G network.
It is important to recognize that ensuring security in 4G and 5G networks is an ongoing process that requires constant monitoring and adaptation. The security landscape is constantly evolving, and new threats will continue to emerge. Therefore, it is essential to remain vigilant and proactive in addressing security challenges in mobile networks.

Reference:

[1]Security Issues and Solutions in 4G/LTE Networks by W. Wang, J. Wu, and H. Zhang, published in IEEE Communications Surveys & Tutorials, 2016.
[2]5G Security: Analysis of Threats and Solutions by F. Zarafshan and A. R. Naseer, published in IEEE Communications Magazine, 2020.
[3]Securing 5G Networks: State of the Art and Future Directions by Y. Li, W. Zhang, and Y. Chen, published in IEEE Network, 2019.
[4]Security and Privacy Challenges in 5G Networks: Opportunities and Solutions by S. A. Hussain, S. Raza, and S. A. Madani, published in Journal of Network and Computer Applications, 2021.
[5]Challenges and Solutions for Security in Mobile Networks: A Comprehensive Review by M. Elhoseny, A. El-Mahdy, and A. El-Sisi, published in Future Generation Computer Systems, 2018.
[6]Tariq, M.A., Aslam, S. and Saleem, Y., 2019. Security in 4G and 5G cellular networks: A survey of the state-of-the-art. IEEE Communications Surveys & Tutorials, 21(4), pp.3684-3722.
[7]Zhang, Q., Wu, Y. and Yin, S., 2019. Security and privacy in 5G mobile networks: challenges and solutions. IEEE Network, 33(6), pp.176-183.
[8]Khan, M.A.U., Islam, S.M.R., Mahmud, S. and Islam, M.R., 2020. 5G security: challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 11(11), pp.5041-5062.
[9]Bhattacharya, S. and Kalita, J.K., 2019. Security issues, challenges and solutions for 5G wireless networks. Journal of Network and Computer Applications, 135, pp.62-88.
[10]Kim, S.W., Park, S.Y. and Lee, K., 2017. Security challenges for the future internet. Journal of Information Processing Systems, 13(5), pp.991-1013.
[11]Hou, Y.T., Chen, Y. and Shih, W.K., 2020. A survey on 5G security: potential threats, requirements and solutions. IEEE Access, 8, pp.115156-115183.
[12]Cui, Z., Yu, F.R., Zhou, X. and Zhang, Y., 2018. Security and privacy in 5G wireless networks: A tutorial. IEEE Communications Magazine, 56(2), pp.31-37.
[13]Singh, A., Vatsa, M. and Singh, R., 2020. Security challenges in 5G networks: a comprehensive review. IEEE Communications Surveys & Tutorials, 22(1), pp.470-518.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值