Professional Documents
Culture Documents
5G Security 1
5G Security 1
Abstract— With the introduction of 5G Mobile Wireless Heterogeneous Network (HetNet), mMIMO, millimeter
Networks there are many issues regarding security. The wave (mmwave) [8], D2D communication [7], M2M
comprehensive study of new 5G Mobile Wireless Network in Communication. General architecture of 5G Wireless
contrast with conventional cellular network (4G) is to be done. Systems is depicted in Fig. 1 [2]. 5G will not only provide
It begins with the particularities of 5G network and new conventional data and voice services. But there are some use
requirements as well as motivation of 5G Mobile Security. The
threats and security concerns are to be studied. The recent
cases for vehicle to vehicle communication, health
developments in existing scheme of 5G Mobile Network based applications, smart cities, industry atomization and so on.
on security services like Authentication of Devices, Availability These new technologies, new architecture, new applications
of network in a specified area, Confidentiality of Data, Privacy bring in the new security issues and need to resolve them.
and intrusion detection is to be summarized. 5G Mobile
Wireless Network has new security features because of many
new different technologies used in 5G such as Internet of
Things(IoT), massive multiple-input multiple- output
(mMIMO), device-to-device communications(D2D) and
software defined networks(SDN). Based on these security
development and research new 5G Mobile Wireless Securities
is explained. New Intrusion detection techniques also required
to be developed for the future mobile wireless network. Future
directions and scope in security management in 5G is then
summarized.
I. INTRODUCTION
147
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)
communication. Even if message is encrypted, traffic important to avoid previously mentioned attacks and
analyzer can still read the pattern of communication. This preserve user Privacy and Data Confidentiality. In 4G LTE,
attack also doesn’t affect communication or network. These authentication between devices and Base station is done
kind of attack violet Data Confidentiality and User Privacy. before the communication. The authentication present
cellular networks are done using symmetric key approach.
The strength of encryption algorithm plays the most
Whereas in 5G, is not only limited to UE and Base Station
important part to prevent these kinds of attacks, and if Eaves
but also between third party user.
dropper uses higher computational capacity devices than the
communication parties it will be easy to decrypt the B. Confidentiality: Data confidentiality and Privacy are the
message. Present, solution for eavesdropping assumes two types of confidentiality [2]. Data confidentiality helps to
eavesdropper will have lower computational power and less fight against Passive Attacks. Privacy stops unauthorized
data analysis capabilities. Moreover, some technologies users from analyzing or influencing data. The traffic
such as IoT and HetNet this may difficulty to tackle patterns are used to analyze information such as location or
eavesdropping which will lead to more complex scenarios. any sensitive information. This becomes a very sensitive in
Rather than Cryptography PLS techniques are paid more 5G where there will be much more personal data such as
attention in 5G to deal with these problems [9]. health applications, vehicle data etc.
Cryptographic approaches are most popularly used to
B. Jamming: Unlike previously discussed problem Jamming restrict the access from unauthorized users from any
can completely stop the communication between legitimate information to secure data confidentiality. Sender and
users. Jamming prevents legitimate users from receiver use Private Key encryption to encrypt and decrypt
communication and accessing radio resources. This is an data it is also called as symmetric key encryption. In this
Active type of attack and in active attacks solution is cryptography both should share the private key. For sharing
detection oriented. A resource allocation strategy can be the key, secure key distribution method is used. Previous
used to prevent these types of attacks to provide better error methods assume that attacker has less computing
rate performance and increase detection speed. As shown in capabilities and hardware. So those techniques don’t work
figure, malicious node interrupts the communication on attackers with high computing power. PLS can provide
between two authorized parties [9]. better option in these situations to fight with Jamming and
Eavesdropping attack.
C. DoS and DDoS: DoS are the most famous kind of attacks
used to take down the whole network. DoS or DDoS attacks C. Availability: Availability is checking how a service is
can completely exhaust network resources, by sending accessible and usable to a user from anywhere and anytime
malicious request. It is also an Active type of attack which [2]. It is also a degree to which a service is robust against
impacts availability of the network. DoS can be done from any type of attack. DoS and DDoS are the attacks which
more than one node which creates more adversaries for violets the availability of network. Jamming can also
network it is called as DDoS. In 5G Wireless Network with prevent communication between legitimate users by
higher density of devices DoS can attack various layers of interrupting communication links between them. With the
the Network and can become serious threat to the system. A increasing use of IoT nodes it will be very difficult to fight
DoS attack can use to attack nodes which can target on against Jamming and DoS kind of Attacks to maintain
Battery, Memory, Sensors, Radio or CPU [9]. availability of 5G wireless Network. Resource allocation
can become effective method to fight against these
D. MITM: In MITM, the control of the channel between problems.
users is taken by attacker. The attacker will replace, modify,
or totally changes the message to be passed between two D. Integrity: There is no mechanism to avoid duplication or
parties. Fig.2 shows MITM attack models. It is also active modification of message even if Message Authentication
attack which compromises Data Confidentiality, Integrity, provides confirmation of source of the message. 100%
and availability [9]. availability is the aim of 5G Wireless Networks to support
the applications close to human life such as health
III. SECURITY SERVICES monitoring, vehicle monitoring, etc. The important aspect of
New technology, new scenarios, new features in 5G Security in 5G is Integrity of data. Integrity restricts
wireless networks other possibilities and security concerns. message from being edited or copied by any attacker [2].
Here, we discuss five aspects of security services:
authentication, confidentiality, availability, integrity and E. Intrusion Detection: All the above mechanisms are used
intrusion detection. for prevention, but in today’s world security is of too much
concern [11]. If some attacker is successful in bypassing the
A. Authentication: Authentication can be categorized into prevention mechanism like authentication, etc. This
two types, Entity Authentication and Message scenarios is also equally important which need to be taken
Authentication [2]. These kinds of authentications are into consideration.
148
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)
IV. TECHNOLOGIES USED IN 5G which comes into picture when some malicious data comes
In this section, we present the different technologies which into the network bypassing the firewall. But if we consider
can be applied to 5G Wireless Networks. We will take a the case of future mobile wireless networks each node will
brief look at new possibilities and use cases in these new require the security mechanism. Each end user needs to be
technologies. equipped with intrusion detection mechanism due to
heterogeneous networks. So if the above prevention
A. HetNet: The best service to provide high coverage in 5G technique like authentication is misused then security is
is HetNet. HetNet has many heterogeneous characteristics essential. New or Existing IDS techniques or frameworks
and also provides high capacity, better coverage and best will be required [11].
performance in terms of Energy Efficiency (EE) and V. OBSERVATION AND EXISTING WORK
Spectrum Efficiency (SE). Despite these capabilities,
HetNet is more vulnerable in terms of User Equipment to There is a lot of work going on in 5G but standardization
Eavesdropping compared to single tier legacy Network. The process is at very early stage and there is a lot of scope for
HetNet consists of high density of small cells, and with new research in 5G, especially in security aspect. Being
continues handover of small cells, handover will suffer from very new and emerging technology there are several future
performance issues. [2] directions. Following table is for giving a rough idea about
B.D2D: D2D communication means Device can what can be done in order to make communication in 5G
communicate with another Device without going through reliable and secure than ever before. In this paper, we have
the Base Station. D2D communication allows the efficient elaborated very few methods; many new methods are
use of spectrum. Also, it helps in reducing load from Base coming in market. Lot of work is needed to be done to
Station. Dynamic Spectrum access is usually adopted to provide the security, especially in the field of intrusion
improve spectrum efficiency, but this leads to vulnerability detection techniques.
such as Jamming attack. Resource allocation via TABLE I DIFFERENT SERVICES AND APPROACHES IN 5G
cooperation between nodes of D2D is a most used way to Services Approaches
provide security to D2D communication. Besides Authentication SDN Enabled Entity Authentication, CRC based
cooperation, channel access and power control can also be message authentication[3]
used for securing D2D Communication [7]. Availability Pseudo Random Time Hopping [4], Fusion Center
based detection for low power Devices.[5]
Confidentiality Power Control, Artificial Noise with mmWave [6]
C. Massive MIMO: We can achieve high Energy Efficiency Intrusion New framework for Mobile cloud based Solution in
and Spectrum Efficiency for network by using large number detection 5G network [11].
of antennas. By using large number of antennas, we can
achieve huge high throughput. Additionally, it can increase
the security of network, but these large antennas will cause VI. CONCLUSION AND FUTURE WORK
serious interference to each other which will result into The new network 5G which we have studied, is enabling
inconsistent performance. This brings us to another many new applications and provide improvement to the
technology called Beam forming. However, Eavesdropping previous networking technology. This research introduced a
attack can become a major threat in massive MIMO brief knowledge about recent study in 5G Wireless
systems. To fight against this PLS can play a significant role Networks. Talking about security we have touched many
in 5G [8]. facets of it such as, Availability, Authentication, Data
Confidentiality, and Integrity. Many new security use cases
D.IoT: IoT nodes are generally low powered devices with are considered due to applications such as HetNet, IoT,
less computation capabilities. It becomes hard to maintain mMIMO, D2D and intrusion detection techniques. This
security for such nodes with many constraints in terms of many new possibilities and advancement of technology will
power and computational capabilities. It requires lead to new security requirements and there is lot more work
lightweight and efficient mechanism for security. Relaying is needed to be done in this area.
is popularly use to tackle these issues as an effective method Due to the heterogeneous nature of 5G mobile wireless
[10]. RFID stands for Radio Frequency Identification, network many new technologies are getting introduced in
which is widely used in IoT. RFID can be used in many industry. Many new technology use cases will also need to
applications of day to day life like inventory management, be studied in detail. This will bring in new challenges for
traffic flow automation etc. IoT is considered as most Network slicing, Software Defined Network(SDN),
promising technology, which is developing rapidly and will Network Function Virtualization(NFV), mobile cloud
require better network. computing, mobile ad-hoc networks for intrusion detection
in future mobile wireless network. Lot of work is carried out
E. Intrusion detection techniques: There are generally two for providing intrusion prevention, but intrusion detection
mechanisms used for providing the security in wired and overcoming it will be also major task considering the
network. Firstly firewall which is applied at the gateways, heterogeneous nature of 5G.We expect this thesis will help
switches or routers and secondly Intrusion Detection System
149
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)
REFERENCES
[1] N. Panwar, S. Sharma and A. K. Singh, “A Survey on 5G: The Next
Generation of Mobile Communication”, Physical Communication,
vol.18, no. 2, pp. 64-84, 2016.
[2] Dongfeng Fang, Yi Qian, Rose Qingyang Hu. "Security for 5G
Mobile Wireless Networks", IEEE Access, 2018
[3] E. Dubrova, M. Naslund, and G. Selander, “CRC-Based Message
Authentication for 5G Mobile Technology”, IEEE
Trustcom/BigDataSE/ISPA, 2015, pp. 1186-1191.
[4] N. Adem, B. Hamdaoui, and A. Yavuz, “Pseudorandom Time-
Hopping Anti-Jamming Technique for Mobile Cognitive Users”,
2015 IEEE Globecom Workshops (GC Wkshps), 2015, pp. 1-6.
[5] M. Labib, S. Ha, and W. Saad, and J. H. Reed, “A Colonel Blotto
Game for Anti-jamming in the Internet of Things”, 2015 IEEE
Global Communications Conference (GLOBECOM), 2015, pp. 1-6
[6] Y. Ju, H. M. Wang, T. X. Zheng, and Q. Yin, “Secure transmission
with artificial noise in millimeter wave systems”, IEEE Wireless
Communications and Networking Conference, 2016, pp. 1-6
[7] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, ``Energy efficiency and
spectrum efficiency of multihop device-to-device communications
underlaying cellular networks,'' IEEE Trans. Veh. Technol., vol. 65,
no. 1, pp. 367_380, Jan. 2016.
[8] J. Qiao, X. Shen, J. Mark, Q. Shen, Y. He, and L. Lei, ``Enabling
device-to-device communications in millimeter-wave 5G cellular
networks,'' IEEE Commun. Mag., vol. 53, no. 1, pp. 209_215, Jan.
2015.
[9] W. Stallings, Cryptography and Network Security: Principles and
Prac-tice, 6th ed. London, U.K.: Pearson, 2014.
[10] Q. Xu, P. Ren, H. Song, and Q. Du, ``Security enhancement for IoT
communications exposed to eavesdroppers with uncertain locations,''
IEEE Access, vol. 4, pp. 2840_2853, 2016.
[11] Keke Gai, Meikang Qiu, Lixin Tao and Yongxin Zhu, “Intrusion
detection techniques for mobile cloud computing in heterogeneous
5G”, John Wiley & Sons, Ltd., SECURITY AND
COMMUNICATION NETWORKS research article.
150