5G Network Implementation: A Survey on Security Issues, Challenges, and Future Directions

5G Network Implementation: A Survey on Security Issues, Challenges, and Future Directions

Sharma Ji, Abhishek Kumar Mishra
DOI: 10.4018/979-8-3693-5643-2.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Fifth generation (5G) wireless network is a wireless communication standard technology, with substantially faster speeds, extremely low latency, and all-pervasive connectivity. The 5G wireless technology includes strong encryption and authentication systems, the possibility of supply chain threats, and network vulnerability. In this chapter, a brief review of complex environment for 5G networks and the security flaws in the novel technology ideas that 5G will incorporate is presented. Various security issues in Future Generations (XG), post-5G, cellular technology, and potential solutions to the security challenges are also discussed.
Chapter Preview
Top

1. Introduction

Every generation of wireless transmission (WT) moves the technology closer to its goal of providing high-quality, dependable data communication, much like cable data communication. 5G represents a significant advancement in this regard, offering dense base station (BS) deployment with improved quality, incredibly low latency, and higher capacity, together with high coverage and very high 5G public-private collaboration estimates that around 7 trillion objects or devices would be connected and that with advanced privacy, the average service delivery time will drop from 90 hours to 90 minutes (A. Almusaylim & Jhanjhi, 2019). .

A technological growth in the field of network is presented in Table 1.

Table 1.
Recent technological growth in network sector
Technology1G2G3G4G5G
Installation1979-19911991-20012001-20092009-20202020 to Till Now
Bandwidth of
Data
2Kbps64Kbps2Mbps1GbpsMore than1Gbps
TechnologiesAMPS, NMT,
TACS
GSM/GPRS, D-
AMPS, CDMA One
WCDMA/HSPA+, CDMA200
DO, TD-SCDMA
LTE, Advanced
LTE
Not standardized till now
Key differentiatorMobilitySecure, Mass AdoptionBetter internet
experience, applications
Faster broadband
internet, lower latency
Faster internet, IoT, wide
Range of applications
ServicesVoiceSMS, Higher capacity
Packetized data, Digital Voice
Cohesive high-class audio,
Video and data
Wearable
devices, Dynamic information access
Dynamic information
access, wearable devices with AI capabilities
Core networkPSTNPSTNPacket NetworkInternetInternet
WeaknessPoor spectral efficiency, Major security concernsChallenging to support request for email, Narrow data ratesFailure of WAP for
internet access, Tied to legacy, Real performance failed to match hype
Mobile explicit
Architecture and protocols
Infrastructure, security, privacy etc.

Complete Chapter List

Search this Book:
Reset