Filters








2,911 Hits in 5.6 sec

Security architecture for a 5G mHealth system

Bessie Malila, Tinashe E.M. Mutsvangwa
2019 Global Health Innovation  
In this paper, we propose a security architecture for an mHealth system based on a review of standard principles and guidelines for designing 5G security systems.  ...  Evolution of mobile networks to 5G is expected to revolutionise healthcare service delivery due to the stringent performance requirements imposed on 5G.  ...  Acknowledgements This research is supported by the National Research Foundation of South Africa.  ... 
doi:10.15641/ghi.v2i1.765 fatcat:rlot6a74zjexnlqzzfj5mawtlu

Security and Protocol Exploit Analysis of the 5G Specifications [article]

Roger Piqueras Jover, Vuk Marojevic
2018 arXiv   pre-print
can compromise the privacy, security and availability of 5G users and services.  ...  This paper reviews the 5G security architecture, requirements and main processes and evaluates them in the context of known and new protocol exploits.  ...  TABLE II SUMMARY II OF SECURITY AND IMPLEMENTATION CHALLENGES OF 3GPP 5G RELEASE 15.  ... 
arXiv:1809.06925v4 fatcat:z5pd73erwnfzxdnkkuhpps7kjy

3GPP Non-Public Network Security

Anja Jerichow, Betsy Covell, Devaki Chandramouli, Ali Rezaki, Atte Lansisalmi, Juergen Merkel
2020 Journal of ICT Standardization  
While for all of them, security plays an important role, the focus of this paper is on the 3GPP Rel-16 architecture and security concept of 5GS Non-Public Networks.We conclude with insights on the challenges  ...  The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0.  ...  reader: The authors assume a general understanding of the 5GS requirements in 3GPP TS 22.261 [3] , architecture in 3GPP TS 23.501 [10] and security in 3GPP TS 33.501 [11] .  ... 
doi:10.13052/jicts2245-800x.815 fatcat:bpiyk6xfbzbejh44uw7dcdh4ga

Security and Protocol Exploit Analysis of the 5G Specifications

Roger Piqueras Jover, Vuk Marojevic
2019 IEEE Access  
This paper reviews the proposed security architecture and its main requirements and procedures and evaluates them in the context of known and new protocol exploits.  ...  The comparison with known 4G long-term evolution protocol exploits reveals that the 5G security specifications, as of Release 15, Version 1.0.0, do not fully address the user privacy and network availability  ...  PKI-BASED ARCHITECTURE ALTERNATIVE The move towards a PKI-based architecture in 5G is a step in the right direction.  ... 
doi:10.1109/access.2019.2899254 fatcat:prznpzwwgbhx7fose5yp7uwtzi

A Review of SATis5: Perspectives on Commercial and Defense 5G SATCOM Integration

Tien M. Nguyen, Khanh D. Pham, John Nguyen, Genshe Chen, Charles H. Lee, Sam Behseta
2022 Encyclopedia  
The holistic survey approach is used to gain an in-depth understanding of 5G-Terrestrial Network (5G-TN), 5G-Non-Terrestrial Network (5G-NTN), SATis5 testbeds, and projects along with related SATis5 architectures  ...  Based on the survey results, the review provides (i) outlook perspectives on potential SATis5 architectures for current and future integrated defense and commercial satellite communication (SATCOM) with  ...  , 9] provide an excellent overview of 5G-NTN (also known as 3GPP-NTN) and related SATis5 architectures and associated technical challenges.  ... 
doi:10.3390/encyclopedia2030087 fatcat:m4oenr2ainhljmdkz7unxcfczm

Authentication Mechanisms in the 5G System

Xiaoting Huang, Takahito Yoshizawa, Sheeba Backia Mary Baskaran
2021 Journal of ICT Standardization  
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication.  ...  Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of 'authentication' has expanded.  ...  Systems and the Internet of Things with contract number C16/15/058.  ... 
doi:10.13052/jicts2245-800x.921 fatcat:yn73daryq5b3xp6w2us6uaxpou

Standards News

2020 IEEE Communications Standards Magazine  
The 5G system architecture defines service-based interactions between control plane (CP) network functions and covers roaming/non-roaming scenarios, interworking between 5GS and EPS, mobility within the  ...  within the 3GPP ecosystem, and also promoting the adoption of 3GPP 5G technology across a variety of industries.  ... 
doi:10.1109/mcomstd.2020.9139037 fatcat:pjgjlh4upvg2ljgaifaaerv2iq

A Security Architecture for 5G Networks

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Hakan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Naslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen (+3 others)
2018 IEEE Access  
The presented security architecture builds upon concepts from the 3G and 4G security architectures but extends and enhances them to cover the new 5G environment.  ...  5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market.  ...  ACKNOWLEDGMENTS This work has mainly been performed within the 5G-ENSURE project (www.5gensure.eu) and received funding from the European Union's Horizon 2020 research and innovation programme under grant  ... 
doi:10.1109/access.2018.2827419 fatcat:qlfa4443yjandm72tmjjic26fa

Introduction of a 5G-enabled Architecture for the Realization of Industry 4.0 Use Cases

Michael Gundall, Mathias Strufe, Hans D. Schotten, Peter Rost, Christian Markwart, Rolf Blunk, Arne Neumann, Jan Griebbach, Markus Aleksy, Dirk Wubben
2021 IEEE Access  
Furthermore, this facilitates the renewal of brownfield deployments to enable a smooth migration to Industry 4.0.  ...  INDEX TERMS 5G, industrial communication, wireless communications, industry 4.0, TACNET 4.0 architecture. 25508 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  While the 4th generation wireless communication systems (4G) CNs were based on functions the 5G CN is service-based.  ... 
doi:10.1109/access.2021.3057675 fatcat:fu355vb4ofaq3oufjkdevdc4fa

5G Internet of Things: A survey

Shancang Li, Li Da Xu, Shanshan Zhao
2018 Journal of Industrial Information Integration  
This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 .  ...  The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards.  ...  provider, the architecture should be able to provide smart services based on the big data analysis.  ... 
doi:10.1016/j.jii.2018.01.005 fatcat:wst2mrwbpjgxvdqqig3yj4ofum

Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions

Jesus Sanchez-Gomez, Dan Garcia-Carrillo, Ramon Sanchez-Iborra, Jose L. Hernandez-Ramos, Jorge Granjal, Rafael Marin-Perez, Miguel A. Zamora-Izquierdo
2020 IEEE Access  
in a new service-based architecture for 5G.  ...  release=Rel15&tech=4 specifications address additional security aspects, such as the "Study on security aspects of the 5G Service Based Architecture (SBA)" [135] which identifies key security concerns  ... 
doi:10.1109/access.2020.3041057 fatcat:tosmrfrsm5dfne2pcswejhojni

Standards News

2020 IEEE Communications Standards Magazine  
Specifically, the report will describe the challenges of securing AI-based systems and solutions, including challenges relating to data, algorithms and models in both training and implementation environments  ...  After having defined the RAN architecture components for 5G as part of 3GPP Rel-15, it was planned for RAN3 to finalize Rel-16 by the end of Q1 2020.  ...  This draft recommendation will be based on the 3GPP 5G security architecture and non 3GPP network architecture.  ... 
doi:10.1109/mcomstd.2020.9088322 fatcat:cn247ug4a5f65ljdlazue6qzii

A Systematic Analysis of 5G Networks with a Focus on 5G Core Security

Qiang Tang, Orhan Ermis, Cu D. Nguyen, Alexandre De Oliveira, Alain Hirtzig
2022 IEEE Access  
In this paper, we bridge this gap by providing a concise review of some 5G's new features, including the Service Based Architecture (SBA) and key Network Functions (NFs), the new security features in User  ...  After many years of work, 5G standards are still under development and the corresponding technical specifications continue to evolve on the fly.  ...  ACKNOWLEDGEMENTS This paper is supported in the context of the RDI Law project "POST 5G Secure Experience" funded by Luxembourg Government.  ... 
doi:10.1109/access.2022.3151000 fatcat:6nuilt3ejfepzhi2ynjz3lrgba

5G Non-Public Networks: Standardization, Architectures and Challenges

Jonathan Prados-Garzon, Pablo Ameigeiras, Jose Ordonez-Lucena, Pablo Munoz, Oscar Adamuz-Hinojosa, Daniel Camps-Mur
2021 IEEE Access  
Then, we review the latest 3rd Generation Partnership Project (3GPP) Release 16 capabilities to support private 5G networks.  ...  INDEX TERMS 5G, non-public networks (NPNs), private 5G networks, architectures.  ...  Unlike the first category, (i) the traffic across facility sites is entirely protected under the umbrella of 3GPP 5G security framework, and (ii) the 5GS is now partially hosted by the PLMN.  ... 
doi:10.1109/access.2021.3127482 fatcat:tuz3iutlkza4xmh3n4cwpb3fda

Overview on the Security in 5G Phase 2

Noamen Ben Henda
2020 Journal of ICT Standardization  
Nevertheless, some of the new features in 5G Phase 2 give rise to subtle security challenges which may require enhancements to the existing mechanisms.  ...  During the early development stages of the 5G specifications by 3GPP, it was quickly identified that it is not possible to address all the use cases of the 5G System within the normal Release timeframe  ...  Overview of 5G Security in Phase 1 Figure 1 below illustrates a simplified architecture of the 5G System including only the security related functions.  ... 
doi:10.13052/jicts2245-800x.811 fatcat:gj4ifkuhhjfptcav4gqtx26nl4
« Previous Showing results 1 — 15 out of 2,911 results