4Design Principles for 5G Security

Ijaz Ahmad1, Madhusanka Liyanage1, Shahriar Shahabuddin1, Mika Ylianttila1, and Andrei Gurtov2

1 Centre for Wireless Communications (CWC), University of Oulu, Finland

2 Department of Computer and Information Science, Linköping University, Linköping, Sweden

4.1 Introduction

The vision of the 5G wireless networks lies in providing very high data rates, higher coverage through dense base station deployment with increased capacity, significantly better Quality of Service (QoS), and extremely low latency [1]. 5G is considered to provide broadband access everywhere, entertain higher user mobility, enable connectivity of a massive number of devices (e.g. IoT), and the connectivity will be ultra‐reliable and affordable [2]. The development towards an all‐IP‐based communication, for example in 4G, has already helped develop new business opportunities, provide new online services and connect industrial machines, home appliances and business units. However, with this development, the security challenges and threat vectors have also increased.

Wireless communication systems were prone to security vulnerabilities from the very beginning. In the first generation (1G) wireless networks, mobile phones and wireless channels were targeted for illegal cloning and masquerading. In the second generation (2G) of wireless networks, message spamming became common, not only by pervasive attacks but also by injecting false information or broadcasting unwanted marketing ...

Get A Comprehensive Guide to 5G Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.