Date of Publication :8th January 2018
Abstract: The advanced features of 5 G mobile wireless network networks bring new criteria and challenges for security. Compared to traditional cellular networks, this paper provides a comprehensive survey on 5G wireless network systems reliability. The paper begins with a study of the particularities of 5G wireless networks as well as the new requirements and reasons of 5G wireless securities. The potential attacks and security services in 5G wireless networks are then summarized with the consideration of new service requirements and new use cases. The recent development and existing 5G wireless security schemes are presented based on the appropriate security services including authentication, availability, confidentiality of data, key management and privacy The paper also addresses the new security innovations that include various technologies introduced to 5G such as heterogeneous networks, device-to-device networking, large multiple-input multiple-output, software-defined networks, and the Internet of Things Motivated by these research and development activities on security, we are proposing a new 5G wireless security architecture, based on which identity management analysis and flexible authentication are offered. As a case study, we are exploring a handover procedure and a signaling load scheme to show the advantage of the security architecture that is proposed. The challenges of 5G wireless security and its future directions are finally summarized.
Reference :
-
- J. G. Andrews et al., “What will 5G be?,” IEEE J. Sel. Areas Commun., 2014, doi: 10.1109/JSAC.2014.2328098.
- W. Xiang, K. Zheng, and X. S. Shen, 5G mobile communications. 2016.
- R. Scott, “Base station,” IHS Jane’s Def. Wkly., 2015, doi: 10.1007/978-3-642-41714-6_20809.
- J. Hoydis, C. Hoek, T. Wild, and S. Ten Brink, “Channel measurements for large antenna arrays,” in Proceedings of the International Symposium on Wireless Communication Systems, 2012, doi: 10.1109/ISWCS.2012.6328480.
- A. Gupta and R. K. Jha, “A Survey of 5G Network: Architecture and Emerging Technologies,” IEEE Access. 2015, doi: 10.1109/ACCESS.2015.2461602.
- D. Gesbert, S. Hanly, H. Huang, S. Shamai Shitz, O. Simeone, and W. Yu, “Multi-cell MIMO cooperative networks: A new look at interference,” IEEE J. Sel. Areas Commun., 2010, doi: 10.1109/JSAC.2010.101202.
- J. L. Fenton et al., “Digital Identity Guidelines,” NIST Spec. Publ. 800-63B, 2017, doi: 10.6028/NIST.SP.800-63b.
- C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning, “AndBot: Towards advanced mobile botnets,” in LEET 2011 - 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats: Botnets, spyware, Worms, and More, 2011.
- J. G. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. C. Reed, “Femtocells: Past, present, and future,” IEEE Journal on Selected Areas in Communications. 2012, doi: 10.1109/JSAC.2012.120401.
- S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks,” IEEE Commun. Surv. Tutorials, 2013, doi: 10.1109/SURV.2013.031413.00127.
- Usha Yadav , Gagandeep Singh Narula, Neelam Duhan , Vishal Jain , B. K. Murthy, “Development and Visualization of Domain Specific Ontology using Protege “,Indian Journal of Science and Technology, Vol. 9, No. 16, April, 2016, page no. 1-7 having ISSN No. 0974-6846.
- Usha Yadav, B K Murthy, Gagandeep Singh Narula, Neelam Duhan and Vishal Jain, “EasyOnto: A Collaborative Semi Formal Ontology Development Platform”, CSI-2015; 50th Golden Jubilee Annual Convention on “Digital Life”, held on 02nd to 05th December, 2015 at New Delhi, published by the Springer under Nature Inspired Computing, Advances in Intelligent Systems and Computing having ISBN 978-981-10-6746-4 page no. 1 to 11.
- Usha Yadav, Gagandeep Singh Narula, Neelam Duhan and Vishal Jain, “A Novel Approach for Precise Search Results Retrieval based on Semantic Web Technologies”, 10th INDIACom; INDIACom-2016, 3rd 2016 International Conference on “Computing for Sustainable Global Development”, 16th – 18th March, 2016 having ISBN No. 978-9-3805-4421-2/, page no. 1357 to 1362.
- Balamurugan S, Visalakshi P, “Hybrid Firefly Algorithm Harmony Search for Feature Selection with BCNF for Multiple Subtables and EM-GMM for Top Down Initial Partitioning”, Asian Journal of Research in Social Sciences and Humanities Year : 2016, Volume : 6, Issue : 8, 2016
- Balamurugan S, Visalakshi P, “PrivacyPreserving Data Mining of Query Logs with Multiple Log Subtables in Conditional Functional Dependencies”, Asian Journal of Research in Social Sciences and Humanities Year : 2016, Volume : 6, Issue : 8, 2016
- Balamurugan S, Visalakshi P, “Boyce-Codd Normal Form Based Privacy Preserving Multiple Subtables with Conditional Functional Dependencies”, Asian Journal of Information Technology Vol 15, Issue : 12, 2016