Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3372938.3372967acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

4G and 5G: Security and privacy analysis

Published: 07 January 2020 Publication History

Abstract

The advanced features of 5G mobile wireless network systems, especially with providing broadband access everywhere, entertain higher user mobility, yield new security requirements and challenges. This paper presents a comprehensive study on the security of 5G wireless network systems compared with the cellular network 4G.

References

[1]
N. Seddigh (2010)."Security Advances and Challenges in 4G Wireless Networks", 10(3), 978-1-4244-7574-2/10/$26.00 © 2010 IEEE.
[2]
Elias Bou-Harb, "Communication Security for Smart Grid Distribution Networks", IEEE Communications Magazine · January 201342, 0163-6804/13/$25.00 © 2013 IEEE
[3]
Dan Forsberg, ENHANCING SECURITY AND PRIVACY IN 3GPP E-UTRAN RADIO INTERFACE, 1-4244-1144-0/07/$25.00 ©2007 IEEE.
[4]
Xiaoyu Duan and Xianbin Wang, Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking, IEEE Communications Magazine · April 2015, 0163-6804/15/$25.00 © 2015 IEEE
[5]
Georgios Mantas, Security for 5G Communications, Fundamentals of 5G Mobile Networks, First Edition. Edited by Jonathan Rodriguez. © 2015 John Wiley & Sons, Ltd. Published 2015 by John Wiley & Sons, Ltd.
[6]
Monica Paolini, Wireless security in LTE networks, Senza Fili Consulting, © 2012 Senza Fili Consulting · www.senzafiliconsulting.com
[7]
Piqueras Jover et al.: Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security 20142014:7.
[8]
Roger Piqueras Jover, Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research, Conference Paper · January 2013,
[9]
Igor Bilogrevic, Security Issues in Next Generation Mobile Networks: LTE and Femtocells.
[10]
Cristina-Elena Vintilă, Security Analysis of LTE Access Network, Copyright (c) IARIA, 2011, ISBN:978-1-61208-113-7
[11]
Li Xiehua, Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network, 978-1-4244-6252-0/11/$26.00 ©2011 IEEE
[12]
Ijaz Ahmad, 5G Security: Analysis of Threats and Solutions, 978-1-5386-3070-9/17/$31.00 ©2017 IEEE

Cited By

View all
  • (2024)Security Analysis of Critical 5G InterfacesIEEE Communications Surveys & Tutorials10.1109/COMST.2024.337716126:4(2382-2410)Online publication date: Dec-2025
  • (2024)Analysis of Power Consumption After Switching to 5GInnovations in Smart Cities Applications Volume 710.1007/978-3-031-53824-7_48(530-545)Online publication date: 20-Feb-2024
  • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDIoT '19: Proceedings of the 4th International Conference on Big Data and Internet of Things
October 2019
476 pages
ISBN:9781450372404
DOI:10.1145/3372938
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 January 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 4G
  2. 5G
  3. Ip
  4. Security
  5. architecture
  6. communication
  7. mobile
  8. network
  9. privacy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDIoT'19

Acceptance Rates

BDIoT '19 Paper Acceptance Rate 75 of 136 submissions, 55%;
Overall Acceptance Rate 75 of 136 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Security Analysis of Critical 5G InterfacesIEEE Communications Surveys & Tutorials10.1109/COMST.2024.337716126:4(2382-2410)Online publication date: Dec-2025
  • (2024)Analysis of Power Consumption After Switching to 5GInnovations in Smart Cities Applications Volume 710.1007/978-3-031-53824-7_48(530-545)Online publication date: 20-Feb-2024
  • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021
  • (2020)Security Challenges and Solutions for 5G HetNet2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00177(1318-1323)Online publication date: Dec-2020
  • (2020)Comparison of 4G and 5G Cellular Network Architecture and Proposing of 6G, a new era of AI2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA)10.1109/CITISIA50690.2020.9371846(1-10)Online publication date: 25-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media