IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i3p67-d1342088.html
   My bibliography  Save this article

A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas

Author

Listed:
  • Paul Scalise

    (Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA)

  • Matthew Boeding

    (Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA)

  • Michael Hempel

    (Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA)

  • Hamid Sharif

    (Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA)

  • Joseph Delloiacovo

    (Belcan Government Solutions (BGS), Bellevue, NE 68123, USA)

  • John Reed

    (Belcan Government Solutions (BGS), Bellevue, NE 68123, USA)

Abstract

With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today’s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.

Suggested Citation

  • Paul Scalise & Matthew Boeding & Michael Hempel & Hamid Sharif & Joseph Delloiacovo & John Reed, 2024. "A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas," Future Internet, MDPI, vol. 16(3), pages 1-38, February.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:3:p:67-:d:1342088
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/3/67/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/3/67/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:3:p:67-:d:1342088. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.