Comprehensive Analysis of Security Challenges and Mitigation Strategies in 5G Mobile Wireless Networks
Main Article Content
Abstract
The year 2025 will be a markedly more enriched and complex one in the communication network and service environment than the present scenario. The existing telecommunication technologies are expected to undergo upsurged enhancements, such as changed radio interaction and spectrum, with the emergence of 5th Generation (5G) mobile communication. The persistent and increasing need for multiple applications like massive access to the device, low latency, ultra-high bandwidth, reliability, etc., is met using enormous ground-breaking technologies embraced by the 5G network. Simultaneously, the core network and the logical layer on which the traditional security throws its light are no longer compatible with the 5G Mobile wireless network. Various factors like architectural errors, poor execution of communication protocol, exchange of metadata information, and so on, could be a menace to security and privacy if 5G Mobile wireless networks are programmed to execute all their activities in a secure platform. Furthermore, new privacy issues might arise due to its complexity and inadaptability due to the rapid change and the present communication infrastructure’s tendency. 5G security also requires physical layer security as a part of it. However, the unavailability of proper research on vulnerabilities across all layers in 5G contributes primarily to security research findings at each layer. Correspondingly, potential security threats have failed to generate automated solutions. In the perception of an automated attack detection model, this article conducts a detailed research study of 5G security, incorporating the physical and logical layers to provide an automated solution for 5G security.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
Computational Discovery and Intelligent Systems (CDIS) content is published under a Creative Commons Attribution License (CCBY). This means that content is freely available to all readers upon publication, and content is published as soon as production is complete.
Computational Discovery and Intelligent Systems (CDIS) seeks to publish the most influential papers that will significantly advance scientific understanding. Selected articles must present new and widely significant data, syntheses, or concepts. They should merit recognition by the wider scientific community and the general public through publication in a reputable scientific journal.