A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security architecture for a 5G mHealth system
2019
Global Health Innovation
In this paper, we propose a security architecture for an mHealth system based on a review of standard principles and guidelines for designing 5G security systems. ...
Evolution of mobile networks to 5G is expected to revolutionise healthcare service delivery due to the stringent performance requirements imposed on 5G. ...
Acknowledgements This research is supported by the National Research Foundation of South Africa. ...
doi:10.15641/ghi.v2i1.765
fatcat:rlot6a74zjexnlqzzfj5mawtlu
Security and Protocol Exploit Analysis of the 5G Specifications
[article]
2018
arXiv
pre-print
can compromise the privacy, security and availability of 5G users and services. ...
This paper reviews the 5G security architecture, requirements and main processes and evaluates them in the context of known and new protocol exploits. ...
TABLE II SUMMARY II OF SECURITY AND IMPLEMENTATION CHALLENGES OF 3GPP 5G RELEASE 15. ...
arXiv:1809.06925v4
fatcat:z5pd73erwnfzxdnkkuhpps7kjy
3GPP Non-Public Network Security
2020
Journal of ICT Standardization
While for all of them, security plays an important role, the focus of this paper is on the 3GPP Rel-16 architecture and security concept of 5GS Non-Public Networks.We conclude with insights on the challenges ...
The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. ...
reader: The authors assume a general understanding of the 5GS requirements in 3GPP TS 22.261 [3] , architecture in 3GPP TS 23.501 [10] and security in 3GPP TS 33.501 [11] . ...
doi:10.13052/jicts2245-800x.815
fatcat:bpiyk6xfbzbejh44uw7dcdh4ga
Security and Protocol Exploit Analysis of the 5G Specifications
2019
IEEE Access
This paper reviews the proposed security architecture and its main requirements and procedures and evaluates them in the context of known and new protocol exploits. ...
The comparison with known 4G long-term evolution protocol exploits reveals that the 5G security specifications, as of Release 15, Version 1.0.0, do not fully address the user privacy and network availability ...
PKI-BASED ARCHITECTURE ALTERNATIVE The move towards a PKI-based architecture in 5G is a step in the right direction. ...
doi:10.1109/access.2019.2899254
fatcat:prznpzwwgbhx7fose5yp7uwtzi
A Review of SATis5: Perspectives on Commercial and Defense 5G SATCOM Integration
2022
Encyclopedia
The holistic survey approach is used to gain an in-depth understanding of 5G-Terrestrial Network (5G-TN), 5G-Non-Terrestrial Network (5G-NTN), SATis5 testbeds, and projects along with related SATis5 architectures ...
Based on the survey results, the review provides (i) outlook perspectives on potential SATis5 architectures for current and future integrated defense and commercial satellite communication (SATCOM) with ...
, 9] provide an excellent overview of 5G-NTN (also known as 3GPP-NTN) and related SATis5 architectures and associated technical challenges. ...
doi:10.3390/encyclopedia2030087
fatcat:m4oenr2ainhljmdkz7unxcfczm
Authentication Mechanisms in the 5G System
2021
Journal of ICT Standardization
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. ...
Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of 'authentication' has expanded. ...
Systems and the Internet of Things with contract number C16/15/058. ...
doi:10.13052/jicts2245-800x.921
fatcat:yn73daryq5b3xp6w2us6uaxpou
Standards News
2020
IEEE Communications Standards Magazine
The 5G system architecture defines service-based interactions between control plane (CP) network functions and covers roaming/non-roaming scenarios, interworking between 5GS and EPS, mobility within the ...
within the 3GPP ecosystem, and also promoting the adoption of 3GPP 5G technology across a variety of industries. ...
doi:10.1109/mcomstd.2020.9139037
fatcat:pjgjlh4upvg2ljgaifaaerv2iq
A Security Architecture for 5G Networks
2018
IEEE Access
The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment. ...
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. ...
ACKNOWLEDGMENTS This work has mainly been performed within the 5G-ENSURE project (www.5gensure.eu) and received funding from the European Union's Horizon 2020 research and innovation programme under grant ...
doi:10.1109/access.2018.2827419
fatcat:qlfa4443yjandm72tmjjic26fa
Introduction of a 5G-enabled Architecture for the Realization of Industry 4.0 Use Cases
2021
IEEE Access
Furthermore, this facilitates the renewal of brownfield deployments to enable a smooth migration to Industry 4.0. ...
INDEX TERMS 5G, industrial communication, wireless communications, industry 4.0, TACNET 4.0 architecture. 25508 This work is licensed under a Creative Commons Attribution 4.0 License. ...
While the 4th generation wireless communication systems (4G) CNs were based on functions the 5G CN is service-based. ...
doi:10.1109/access.2021.3057675
fatcat:fu355vb4ofaq3oufjkdevdc4fa
5G Internet of Things: A survey
2018
Journal of Industrial Information Integration
This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 . ...
The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. ...
provider, the architecture should be able to provide smart services based on the big data analysis. ...
doi:10.1016/j.jii.2018.01.005
fatcat:wst2mrwbpjgxvdqqig3yj4ofum
Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions
2020
IEEE Access
in a new service-based architecture for 5G. ...
release=Rel15&tech=4 specifications address additional security aspects, such as the "Study on security aspects of the 5G Service Based Architecture (SBA)" [135] which identifies key security concerns ...
doi:10.1109/access.2020.3041057
fatcat:tosmrfrsm5dfne2pcswejhojni
Standards News
2020
IEEE Communications Standards Magazine
Specifically, the report will describe the challenges of securing AI-based systems and solutions, including challenges relating to data, algorithms and models in both training and implementation environments ...
After having defined the RAN architecture components for 5G as part of 3GPP Rel-15, it was planned for RAN3 to finalize Rel-16 by the end of Q1 2020. ...
This draft recommendation will be based on the 3GPP 5G security architecture and non 3GPP network architecture. ...
doi:10.1109/mcomstd.2020.9088322
fatcat:cn247ug4a5f65ljdlazue6qzii
A Systematic Analysis of 5G Networks with a Focus on 5G Core Security
2022
IEEE Access
In this paper, we bridge this gap by providing a concise review of some 5G's new features, including the Service Based Architecture (SBA) and key Network Functions (NFs), the new security features in User ...
After many years of work, 5G standards are still under development and the corresponding technical specifications continue to evolve on the fly. ...
ACKNOWLEDGEMENTS This paper is supported in the context of the RDI Law project "POST 5G Secure Experience" funded by Luxembourg Government. ...
doi:10.1109/access.2022.3151000
fatcat:6nuilt3ejfepzhi2ynjz3lrgba
5G Non-Public Networks: Standardization, Architectures and Challenges
2021
IEEE Access
Then, we review the latest 3rd Generation Partnership Project (3GPP) Release 16 capabilities to support private 5G networks. ...
INDEX TERMS 5G, non-public networks (NPNs), private 5G networks, architectures. ...
Unlike the first category, (i) the traffic across facility sites is entirely protected under the umbrella of 3GPP 5G security framework, and (ii) the 5GS is now partially hosted by the PLMN. ...
doi:10.1109/access.2021.3127482
fatcat:tuz3iutlkza4xmh3n4cwpb3fda
Overview on the Security in 5G Phase 2
2020
Journal of ICT Standardization
Nevertheless, some of the new features in 5G Phase 2 give rise to subtle security challenges which may require enhancements to the existing mechanisms. ...
During the early development stages of the 5G specifications by 3GPP, it was quickly identified that it is not possible to address all the use cases of the 5G System within the normal Release timeframe ...
Overview of 5G Security in Phase 1 Figure 1 below illustrates a simplified architecture of the 5G System including only the security related functions. ...
doi:10.13052/jicts2245-800x.811
fatcat:gj4ifkuhhjfptcav4gqtx26nl4
« Previous
Showing results 1 — 15 out of 2,911 results