Comprehensive Analysis of Security Challenges and Mitigation Strategies in 5G Mobile Wireless Networks

Main Article Content

Ahmed Hammad
Arwa Saad
Amer Ibrahim
Ahmed A. Elngar

Abstract

The year 2025 will be a markedly more enriched and complex one in the communication network and service environment than the present scenario. The existing telecommunication technologies are expected to undergo upsurged enhancements, such as changed radio interaction and spectrum, with the emergence of 5th Generation (5G) mobile communication. The persistent and increasing need for multiple applications like massive access to the device, low latency, ultra-high bandwidth, reliability, etc., is met using enormous ground-breaking technologies embraced by the 5G network. Simultaneously, the core network and the logical layer on which the traditional security throws its light are no longer compatible with the 5G Mobile wireless network. Various factors like architectural errors, poor execution of communication protocol, exchange of metadata information, and so on, could be a menace to security and privacy if 5G Mobile wireless networks are programmed to execute all their activities in a secure platform. Furthermore, new privacy issues might arise due to its complexity and inadaptability due to the rapid change and the present communication infrastructure’s tendency. 5G security also requires physical layer security as a part of it. However, the unavailability of proper research on vulnerabilities across all layers in 5G contributes primarily to security research findings at each layer. Correspondingly, potential security threats have failed to generate automated solutions. In the perception of an automated attack detection model, this article conducts a detailed research study of 5G security, incorporating the physical and logical layers to provide an automated solution for 5G security.

Downloads

Download data is not yet available.

Article Details

Section

Original Research

How to Cite

Comprehensive Analysis of Security Challenges and Mitigation Strategies in 5G Mobile Wireless Networks. (2025). Computational Discovery and Intelligent Systems (CDIS), 1(2), 36-42. https://pub.scientificirg.com/index.php/CDIS/article/view/17

Similar Articles

You may also start an advanced similarity search for this article.