A survey on 5G private and B5G network threats and safeguarding AI-based security mechanisms through the layered analysis

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Saman Tariq , Eva Rodriguez Luna , Xavier Masip Bruin , Rodrigo Diaz , Josep Martrat , Panagiotis Trakadas
{"title":"A survey on 5G private and B5G network threats and safeguarding AI-based security mechanisms through the layered analysis","authors":"Saman Tariq ,&nbsp;Eva Rodriguez Luna ,&nbsp;Xavier Masip Bruin ,&nbsp;Rodrigo Diaz ,&nbsp;Josep Martrat ,&nbsp;Panagiotis Trakadas","doi":"10.1016/j.comnet.2025.111594","DOIUrl":null,"url":null,"abstract":"<div><div>The fifth-generation (5G) mobile network has shifted the paradigm in connectivity, high-speed data transmission, ultra-low latency, ultra-high throughput, multisense transmission, and ultra-high reliability. Today, industries are increasingly adopting 5G private networks, which also handle sensitive data related to business information, trade secrets, and personal data. Attacks on 5G private networks can potentially result in losing a competitive advantage since different security threats and vulnerabilities progressively target these networks. The unique infrastructure of the 5G network architecture and key enabling technologies exposes them to various vulnerabilities that attackers can target to breach sensitive data, steal information, and disrupt critical systems. Therefore, paying special attention to the security issues of 5G private networks is essential. The advancement of future wireless technology came about because of the different and diverse nature of connected devices, in contrast to the previous generation of mobile networks. The B5G network provides support to open network platforms, open interfaces, and the integration of different key enabling technologies helps manage network services and deploy new services needed for diverse requirements. At the same time, it has increased the attack surface compared to previous-generation networks. Therefore, it is imperative to conduct a review that focuses on addressing and classifying the different emerging threats in the private 5G and B5G networks in a distinctive way. In this paper, we have adopted a layered architecture from an industrial use case of 5G private networks to identify and classify different threats in 5G private networks. The study also characterized and modeled the different threats using information on the type of attack, entry points, and impact of the attack on the architecture layer. Moreover, an analysis of key enablers in 5G private and B5G networks and information on security threats and cyber-attacks is also presented. To accommodate the emerging threats in next-generation wireless technology, we have classified and modeled the different threats in the B5G domain using the common involved layer, which includes perception, network, and application layers in Hexa-x E2E and 6G IoT-enabled architecture. Organizations and projects that do not actively engage in cutting-edge technologies will lose their competitive advantage in the evolving technological landscape. This study has mapped the identified threat categories with different types of threats that could occur at different layers and assessed the entry points of the attacker. We have also identified the attack’s impact at each layer using security requirements related to confidentiality, availability, and integrity. Furthermore, this study reviews different AI-enabled solutions that can add value in preserving the security of 5G and B5G networks. Through this review analysis, we can conclude that the layered approach is quite beneficial in identifying the different threats and what security solutions can be offered to mitigate them.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"271 ","pages":"Article 111594"},"PeriodicalIF":4.6000,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625005614","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

The fifth-generation (5G) mobile network has shifted the paradigm in connectivity, high-speed data transmission, ultra-low latency, ultra-high throughput, multisense transmission, and ultra-high reliability. Today, industries are increasingly adopting 5G private networks, which also handle sensitive data related to business information, trade secrets, and personal data. Attacks on 5G private networks can potentially result in losing a competitive advantage since different security threats and vulnerabilities progressively target these networks. The unique infrastructure of the 5G network architecture and key enabling technologies exposes them to various vulnerabilities that attackers can target to breach sensitive data, steal information, and disrupt critical systems. Therefore, paying special attention to the security issues of 5G private networks is essential. The advancement of future wireless technology came about because of the different and diverse nature of connected devices, in contrast to the previous generation of mobile networks. The B5G network provides support to open network platforms, open interfaces, and the integration of different key enabling technologies helps manage network services and deploy new services needed for diverse requirements. At the same time, it has increased the attack surface compared to previous-generation networks. Therefore, it is imperative to conduct a review that focuses on addressing and classifying the different emerging threats in the private 5G and B5G networks in a distinctive way. In this paper, we have adopted a layered architecture from an industrial use case of 5G private networks to identify and classify different threats in 5G private networks. The study also characterized and modeled the different threats using information on the type of attack, entry points, and impact of the attack on the architecture layer. Moreover, an analysis of key enablers in 5G private and B5G networks and information on security threats and cyber-attacks is also presented. To accommodate the emerging threats in next-generation wireless technology, we have classified and modeled the different threats in the B5G domain using the common involved layer, which includes perception, network, and application layers in Hexa-x E2E and 6G IoT-enabled architecture. Organizations and projects that do not actively engage in cutting-edge technologies will lose their competitive advantage in the evolving technological landscape. This study has mapped the identified threat categories with different types of threats that could occur at different layers and assessed the entry points of the attacker. We have also identified the attack’s impact at each layer using security requirements related to confidentiality, availability, and integrity. Furthermore, this study reviews different AI-enabled solutions that can add value in preserving the security of 5G and B5G networks. Through this review analysis, we can conclude that the layered approach is quite beneficial in identifying the different threats and what security solutions can be offered to mitigate them.
通过分层分析,对5G私有和B5G网络威胁及基于人工智能的安全保障机制进行了调查
第五代(5G)移动网络在连接、高速数据传输、超低延迟、超高吞吐量、多感传输和超高可靠性方面改变了范式。如今,各行各业越来越多地采用5G专用网络,该网络还处理与商业信息、商业秘密和个人数据相关的敏感数据。对5G专用网络的攻击可能会导致竞争优势的丧失,因为不同的安全威胁和漏洞会逐渐针对这些网络。5G网络架构的独特基础设施和关键使能技术使其暴露于攻击者可以攻击的各种漏洞,以破坏敏感数据、窃取信息和破坏关键系统。因此,特别关注5G专网的安全问题至关重要。与上一代移动网络相比,未来无线技术的进步是因为连接设备的不同和多样性。B5G网络支持开放的网络平台、开放的接口,并集成不同的关键使能技术,有助于管理网络业务和部署不同需求所需的新业务。与此同时,与上一代网络相比,它增加了攻击面。因此,有必要对私有5G和B5G网络中出现的不同威胁进行有特色的处理和分类。在本文中,我们采用了来自5G专用网络工业用例的分层架构来识别和分类5G专用网络中的不同威胁。该研究还使用有关攻击类型、入口点和攻击对体系结构层的影响的信息对不同的威胁进行了表征和建模。此外,还分析了5G专用和B5G网络的关键使能因素以及有关安全威胁和网络攻击的信息。为了适应下一代无线技术中出现的威胁,我们使用通用涉及层对B5G领域的不同威胁进行了分类和建模,其中包括Hexa-x E2E和6G物联网支持架构中的感知层、网络层和应用层。不积极参与尖端技术的组织和项目将在不断发展的技术环境中失去竞争优势。本研究将已识别的威胁类别与可能发生在不同层的不同类型的威胁进行了映射,并评估了攻击者的入口点。我们还使用与机密性、可用性和完整性相关的安全需求确定了攻击对每个层的影响。此外,本研究回顾了不同的人工智能解决方案,这些解决方案可以为维护5G和B5G网络的安全性增加价值。通过回顾分析,我们可以得出结论,分层方法在识别不同的威胁以及可以提供哪些安全解决方案来缓解这些威胁方面非常有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信