{"title":"5G Security Landscape: Concept and Remaining Challenges","authors":"M. Pejanović-Djurišić, S. Kukliński","doi":"10.1109/TELFOR56187.2022.9983722","DOIUrl":null,"url":null,"abstract":"Security landscape in 5G networks differs from the previous generations of wireless networks, mainly due to the emergence of new applications and implemented technologies that require new security concept in order to provide efficient and secure connectivity. Thus, 5G security architecture has been built using security-by-design approach which takes into account basic challenges and risks. While such architecture is evidently robust with a number of advanced security measures and mechanisms, increasing diversity of connected devices, services and networking technologies means new and more complex security threats and vulnerabilities Therefore, this paper aims at identifying gaps and potential shortcomings in the existing 5G security framework. On that basis, recommendations for addressing these issues are specified so that secure and trustworthy implementation and operation of 5G networks would be ensured.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 30th Telecommunications Forum (TELFOR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELFOR56187.2022.9983722","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security landscape in 5G networks differs from the previous generations of wireless networks, mainly due to the emergence of new applications and implemented technologies that require new security concept in order to provide efficient and secure connectivity. Thus, 5G security architecture has been built using security-by-design approach which takes into account basic challenges and risks. While such architecture is evidently robust with a number of advanced security measures and mechanisms, increasing diversity of connected devices, services and networking technologies means new and more complex security threats and vulnerabilities Therefore, this paper aims at identifying gaps and potential shortcomings in the existing 5G security framework. On that basis, recommendations for addressing these issues are specified so that secure and trustworthy implementation and operation of 5G networks would be ensured.