Skip to main content
Top

2016 | OriginalPaper | Chapter

New Security Challenges in the 5G Network

Authors : Seira Hidano, Martin Pečovský, Shinsaku Kiyomoto

Published in: Computational Intelligence and Intelligent Systems

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is a fundamental aspect of the next generation mobile network. In this paper, features of the 5G network, such as IoT and D2D, are described along with the proposal of a new layered network model, which enables independence on multiple radio access technologies (RATs). Additionally, security requirements on the 5G network are stated to facilitate security examination. Security issues arising from new technologies to be used in the 5G network, for example, physical layer security, are investigated in the core section of the paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Americas, G.: 4G Americas’ Recommendations on 5G Requirements and Solutions (2014) Americas, G.: 4G Americas’ Recommendations on 5G Requirements and Solutions (2014)
2.
go back to reference Belfiore, J.C., Delaveau, F., Garrido, E., Ling, C., Sibille, A.: PHYSEC concepts for wireless public networks—introduction, state of the art and perspectives. In: The Proceedings of SDR-WinnComm 2013 (2013) Belfiore, J.C., Delaveau, F., Garrido, E., Ling, C., Sibille, A.: PHYSEC concepts for wireless public networks—introduction, state of the art and perspectives. In: The Proceedings of SDR-WinnComm 2013 (2013)
3.
go back to reference Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.V.: Wireless information-theoretic security. IEEE Trans. Inf. Theor. 54(6), 2515–2534 (2008)CrossRefMathSciNetMATH Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.V.: Wireless information-theoretic security. IEEE Trans. Inf. Theor. 54(6), 2515–2534 (2008)CrossRefMathSciNetMATH
4.
go back to reference Delaveau, F., Evesti, A., Suomalainen, J., Savola, R., Saphira, N.: Active and passive eavesdropper threats within public and private civilian wireless networks—existing and potential future countermeasures—a brief overview. In: The Proceedings of SDR-WinnComm 2013 (2013) Delaveau, F., Evesti, A., Suomalainen, J., Savola, R., Saphira, N.: Active and passive eavesdropper threats within public and private civilian wireless networks—existing and potential future countermeasures—a brief overview. In: The Proceedings of SDR-WinnComm 2013 (2013)
5.
go back to reference Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)CrossRef Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28–35 (2015)CrossRef
6.
go back to reference Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84–106 (2013)CrossRef Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84–106 (2013)CrossRef
7.
go back to reference Harrison, W.K., Almeida, J., Bloch, M.R., McLaughlin, S.W., Barros, J.: Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Proc. Mag. 30(5), 41–50 (2013)CrossRef Harrison, W.K., Almeida, J., Bloch, M.R., McLaughlin, S.W., Barros, J.: Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Proc. Mag. 30(5), 41–50 (2013)CrossRef
8.
go back to reference IMT-2020 (5G) Promotion Group: 5G Visions and Requirements (2014) IMT-2020 (5G) Promotion Group: 5G Visions and Requirements (2014)
9.
go back to reference ITU-R: Future technology trends of terrestrial IMT systems. Report M.2320 (2014) ITU-R: Future technology trends of terrestrial IMT systems. Report M.2320 (2014)
10.
go back to reference ITU-T: X.805 Recommendation: Security architecture for systems providing end-to-end communications (2003) ITU-T: X.805 Recommendation: Security architecture for systems providing end-to-end communications (2003)
11.
go back to reference Kapetanović, D., Zheng, G., Rusek, F.: Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 53, 21 (2015)CrossRef Kapetanović, D., Zheng, G., Rusek, F.: Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 53, 21 (2015)CrossRef
12.
go back to reference Mane, Y.D., Devadkar, K.K.: Protection concern in mobile cloud computing–a survey. IOSR J. Comput. Eng. pp. 39–44 (2013) Mane, Y.D., Devadkar, K.K.: Protection concern in mobile cloud computing–a survey. IOSR J. Comput. Eng. pp. 39–44 (2013)
13.
go back to reference Masleh, R.Y., Haas, H., Sinanović, S., Ahn, C.W., Yun, S.: Spatial modulation. IEEE Trans. Veh. Technol. 57(4), 2228–2241 (2008)CrossRef Masleh, R.Y., Haas, H., Sinanović, S., Ahn, C.W., Yun, S.: Spatial modulation. IEEE Trans. Veh. Technol. 57(4), 2228–2241 (2008)CrossRef
14.
go back to reference Mukherjee, A., Fakoorian, A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1550–1573 (2014)CrossRef Mukherjee, A., Fakoorian, A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1550–1573 (2014)CrossRef
15.
go back to reference Nokia Solutions and Networks: 5G use cases and requirements (2014) Nokia Solutions and Networks: 5G use cases and requirements (2014)
16.
go back to reference Pinto, P.C., Barros, J., Win, M.Z.: Secure communication in stochastic wireless networks–part II maximum rate and collusion. IEEE Trans. Inf. Forensics Secur. 7(1), 139–147 (2012)CrossRef Pinto, P.C., Barros, J., Win, M.Z.: Secure communication in stochastic wireless networks–part II maximum rate and collusion. IEEE Trans. Inf. Forensics Secur. 7(1), 139–147 (2012)CrossRef
17.
go back to reference Radio Access and Spectrum, FP7 Future Networks Cluster: 5G radio network architecture (2014) Radio Access and Spectrum, FP7 Future Networks Cluster: 5G radio network architecture (2014)
18.
go back to reference Tung, Y.C., Han, S., Chen, D., Shin, K.G.: Vulnerability and protection of channel state information in multiuser MIMO networks. In: Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 775–786 (2014) Tung, Y.C., Han, S., Chen, D., Shin, K.G.: Vulnerability and protection of channel state information in multiuser MIMO networks. In: Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), pp. 775–786 (2014)
20.
go back to reference Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks. IEEE Wirel. Commun. 17, 56–62 (2010)CrossRef Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks. IEEE Wirel. Commun. 17, 56–62 (2010)CrossRef
Metadata
Title
New Security Challenges in the 5G Network
Authors
Seira Hidano
Martin Pečovský
Shinsaku Kiyomoto
Copyright Year
2016
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0356-1_64

Premium Partner