IoT : Security & Challenges of 5G Network in Smart Cities

  • Devasis Pradhan
  • Hla Myo Tun
  • Ajit Kumar Dash

Abstract

The fifth era (5G) will overwhelm in the brilliant urban areas where 5G gives every one of the offices most extreme security and privacy. As to administrations, superfluous mishap rates are expanding with digital assaults also, dangers. All security issues for 5 G-based framework will confront many difficulties like secure transportation administrations which is one of the 2030 drives in quite a large number nations. Safeguarding the infrastructure is then extremely significant of 5G-empowered IoT sharing of information against these assaults. This requires the analysts working in this space to propose different sorts of safety conventions under various kinds of classes, as key administration, client validation/gadget confirmation, access control/client access control, and interruption discovery. As the interest for portable information develops, versatile administrators and makers are confronted with a problem. There is a limited measure of radio recurrence range accessible at any one second, yet to satisfy client interest, they should further develop limit and convey higher correspondence rates. This paper gives bits of knowledge into the basic issues and challenges connected with the security, protection, and trust issues of 5G network.

Keywords: IoT, security,privacy,5G,smart cities,access control

Downloads

Download data is not yet available.

References

[1] M. B. M. Noor and W. H. Hassan, ‘‘Current research on Internet of Things (IoT) security: A survey,’’ Comput. Netw., vol. 148, pp. 283–294, Jan. 2019.
[2] J. Sengupta, S. Ruj, and S. D. Bit, ‘‘A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT,’’ J. Netw. Comput. Appl., vol. 149, Jan. 2020, Art. no. 102481.
[3] Devices & Systems, IoT Tech Expo. (2019). Unlocking IoT Data With 5G and AI. Accessed: Oct. 2019. [Online]. Available: https://innovate.ieee.org/innovation-spotlight/5g-iot-ai/
[4] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park, ‘‘AKM-IoV: Authenticated key management protocol in fog computingbased Internet of vehicles deployment,’’ IEEE Internet Things J., vol. 6, no. 5, pp. 8804–8817, Oct. 2019.
[5] M. Ayaz, M. Ammad-Uddin, Z. Sharif, A. Mansour, and E.-H.-M. Aggoune, ‘‘Internet-of-Things (IoT)-based smart agriculture: Toward making the fifields talk,’’ IEEE Access, vol. 7, pp. 129551–129583, 2019.
[6] King’s Healthcare. (2019). A Healing Hand-Giving the World Better Access to Medical Experts Through the Tactile Internet. Accessed: Oct. 2019. [Online]. Available: https://www.ericsson.com/en/ cases/2017/kings-college/kings-healthcare
[7] M. Wazid, A. K. Das, and J.-H. Lee, ‘‘User authentication in a tactile Internet based remote surgery environment: Security issues, challenges, and future research directions,’’ Pervas. Mobile Comput., vol. 54, pp. 71–85, Mar. 2019.
[8] R. Hussain and S. Zeadally, ‘‘Autonomous cars: Research results, issues, and future challenges,’’ IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1275–1313, 2nd Quart., 2019.
[9] Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation and security challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [CrossRef]
[10] Shrestha, R.; Bajracharya, R.; Kim, S. 6G enabled Unmanned Aerial Vehicle Traffific Management: A perspective. IEEE Access 2021, 9, 91119–91136. [CrossRef]
[11] Stoynov, V.; Ivanov, A.; Mihaylova, D. Conceptual Framework for Quality Assessment in human-centric 6G XR services. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Borovets, Bulgaria, 26–29 November 2021; Volume 1032, p. 012009.
[12] Soldani, D.; Guo, Y.J.; Barani, B.; Mogensen, P.; Chih-Lin, I.; Das, S.K. 5G for ultra-reliable low-latency communications. IEEE Netw. 2018, 32, 6–7. [CrossRef]
[13] Chen, R.; Li, C.; Yan, S.; Malaney, R.; Yuan, J. Physical layer security for ultra-reliable and low-latency communications. IEEE Wirel. Commun. 2019, 26, 6–11. [CrossRef]
[14] Hamamreh, J.M.; Basar, E.; Arslan, H. OFDM-subcarrier index selection for Enhancing Security and Reliability of 5G URLLC services. IEEE Access 2017, 5, 25863–25875. [CrossRef] [15] Pradhan, D., & K C, P. (2019). Effectiveness of Spectrum Sensing in Cognitive Radio toward 5G Technology. Saudi Journal of Engineering and Technology (SJEAT) , 4(12), 473–485. https://doi.org/10.36348/sjeat.2019.v04i12.001
[16] Al-Eryani, Y.; Hossain, E. The D-OMA method for massive multiple access in 6G: Performance, security, and challenges. IEEE Veh. Technol. Mag. 2019, 14, 92–99. [CrossRef]
Statistics
0 Views | 0 Downloads
How to Cite
Pradhan, D., Tun, H. M., & Dash, A. K. (2022). IoT : Security & Challenges of 5G Network in Smart Cities. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 8(2), 45-50. https://doi.org/10.33130/AJCT.2022v08i02.010