5G Security Threat Landscape, AI and Blockchain

The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitig...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2023-12, Vol.133 (3), p.1467-1482
1. Verfasser: Alanazi, Mohammad N.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced connectivity and services. However, this combination has also introduced a multifaceted security landscape that necessitates a comprehensive approach to mitigate emerging threats. This paper provides an exhaustive exploration of the 5G Security Threat Landscape investigating the intricacies of security challenges while harnessing innovative solutions to protect the IoT ecosystem. The study comprehensively unravels the diversity of security requirements, including critical aspects such as authentication, encryption, network slicing, and security by design, threat detection, and collaborative frameworks. By elucidating these foundational pillars, the paper highlights the interconnection between security paradigms and technological advancements, under scoring the pivotal role played by Artificial Intelligence (AI), Machine Learning (ML), and blockchain technologies in enhancing security measures. Through an integration of interdisciplinary research, the study emphasizes the imperative of synchronizing collective efforts among stakeholders to mitigate vulnerabilities and facilitate a secure IoT environment within the dynamic 5G landscape. As the technological landscape evolves, this research contributes to the ongoing research of securing the digital infrastructures, at par with researchers, practitioners, and policymakers, as they collectively set up a secure and resilient cyberspace.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-023-10821-6