From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

12/18/2022
by   Angelos Michalas, et al.
0

Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a radical shift in telecommunications. The main reason is that 5G is an enabler of numerous applications we have long envisioned and either simulated or implemented in test environments, partially or on a smaller scale. 5G will soon unlock the potential of smart cities, industry 4.0, and IoT, to name a few. However, a crucial question is how much we can trust this technology. Since this technology will soon become the core infrastructure for all of the above, it is critical to understand the fundamental security mechanisms that comprise this technology and the guarantees they provide to assess the potential risks we are exposed to. This work follows a non-technical yet bottom-up approach to introduce the reader to the core security mechanisms and establish a baseline for the security of 5G, to demystify the principal notions and processes. Based on the above, we streamline future directions and highlight possible threats.

READ FULL TEXT

page 5

page 6

page 7

page 9

page 14

page 15

page 18

page 19

research
05/17/2021

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the ...
research
06/28/2018

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems

Security risk assessment methods have served us well over the last two d...
research
09/29/2021

A Survey on Security and Privacy Issues of UAVs

In the 21st century, the industry of drones, also known as Unmanned Aeri...
research
11/28/2019

RIoTS: Risk Analysis of IoT Supply Chain Threats

Securing the supply chain of information and communications technology (...
research
02/23/2022

Biometric security technology

This paper presents an overview of the main topics related to biometric ...
research
09/30/2021

RFID Exploitation and Countermeasures

Radio Frequency Identification (RFID) systems are among the most widespr...
research
05/26/2022

The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act

Safety is becoming cybersecurity under most circumstances. This should b...

Please sign up or login with your details

Forgot password? Click here to reset