Saman Tariq , Eva Rodriguez Luna , Xavier Masip Bruin , Rodrigo Diaz , Josep Martrat , Panagiotis Trakadas
{"title":"A survey on 5G private and B5G network threats and safeguarding AI-based security mechanisms through the layered analysis","authors":"Saman Tariq , Eva Rodriguez Luna , Xavier Masip Bruin , Rodrigo Diaz , Josep Martrat , Panagiotis Trakadas","doi":"10.1016/j.comnet.2025.111594","DOIUrl":null,"url":null,"abstract":"<div><div>The fifth-generation (5G) mobile network has shifted the paradigm in connectivity, high-speed data transmission, ultra-low latency, ultra-high throughput, multisense transmission, and ultra-high reliability. Today, industries are increasingly adopting 5G private networks, which also handle sensitive data related to business information, trade secrets, and personal data. Attacks on 5G private networks can potentially result in losing a competitive advantage since different security threats and vulnerabilities progressively target these networks. The unique infrastructure of the 5G network architecture and key enabling technologies exposes them to various vulnerabilities that attackers can target to breach sensitive data, steal information, and disrupt critical systems. Therefore, paying special attention to the security issues of 5G private networks is essential. The advancement of future wireless technology came about because of the different and diverse nature of connected devices, in contrast to the previous generation of mobile networks. The B5G network provides support to open network platforms, open interfaces, and the integration of different key enabling technologies helps manage network services and deploy new services needed for diverse requirements. At the same time, it has increased the attack surface compared to previous-generation networks. Therefore, it is imperative to conduct a review that focuses on addressing and classifying the different emerging threats in the private 5G and B5G networks in a distinctive way. In this paper, we have adopted a layered architecture from an industrial use case of 5G private networks to identify and classify different threats in 5G private networks. The study also characterized and modeled the different threats using information on the type of attack, entry points, and impact of the attack on the architecture layer. Moreover, an analysis of key enablers in 5G private and B5G networks and information on security threats and cyber-attacks is also presented. To accommodate the emerging threats in next-generation wireless technology, we have classified and modeled the different threats in the B5G domain using the common involved layer, which includes perception, network, and application layers in Hexa-x E2E and 6G IoT-enabled architecture. Organizations and projects that do not actively engage in cutting-edge technologies will lose their competitive advantage in the evolving technological landscape. This study has mapped the identified threat categories with different types of threats that could occur at different layers and assessed the entry points of the attacker. We have also identified the attack’s impact at each layer using security requirements related to confidentiality, availability, and integrity. Furthermore, this study reviews different AI-enabled solutions that can add value in preserving the security of 5G and B5G networks. Through this review analysis, we can conclude that the layered approach is quite beneficial in identifying the different threats and what security solutions can be offered to mitigate them.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"271 ","pages":"Article 111594"},"PeriodicalIF":4.6000,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625005614","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The fifth-generation (5G) mobile network has shifted the paradigm in connectivity, high-speed data transmission, ultra-low latency, ultra-high throughput, multisense transmission, and ultra-high reliability. Today, industries are increasingly adopting 5G private networks, which also handle sensitive data related to business information, trade secrets, and personal data. Attacks on 5G private networks can potentially result in losing a competitive advantage since different security threats and vulnerabilities progressively target these networks. The unique infrastructure of the 5G network architecture and key enabling technologies exposes them to various vulnerabilities that attackers can target to breach sensitive data, steal information, and disrupt critical systems. Therefore, paying special attention to the security issues of 5G private networks is essential. The advancement of future wireless technology came about because of the different and diverse nature of connected devices, in contrast to the previous generation of mobile networks. The B5G network provides support to open network platforms, open interfaces, and the integration of different key enabling technologies helps manage network services and deploy new services needed for diverse requirements. At the same time, it has increased the attack surface compared to previous-generation networks. Therefore, it is imperative to conduct a review that focuses on addressing and classifying the different emerging threats in the private 5G and B5G networks in a distinctive way. In this paper, we have adopted a layered architecture from an industrial use case of 5G private networks to identify and classify different threats in 5G private networks. The study also characterized and modeled the different threats using information on the type of attack, entry points, and impact of the attack on the architecture layer. Moreover, an analysis of key enablers in 5G private and B5G networks and information on security threats and cyber-attacks is also presented. To accommodate the emerging threats in next-generation wireless technology, we have classified and modeled the different threats in the B5G domain using the common involved layer, which includes perception, network, and application layers in Hexa-x E2E and 6G IoT-enabled architecture. Organizations and projects that do not actively engage in cutting-edge technologies will lose their competitive advantage in the evolving technological landscape. This study has mapped the identified threat categories with different types of threats that could occur at different layers and assessed the entry points of the attacker. We have also identified the attack’s impact at each layer using security requirements related to confidentiality, availability, and integrity. Furthermore, this study reviews different AI-enabled solutions that can add value in preserving the security of 5G and B5G networks. Through this review analysis, we can conclude that the layered approach is quite beneficial in identifying the different threats and what security solutions can be offered to mitigate them.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.