Research Article

Study on Security and Privacy in 5G-Enabled Applications

Table 5

Countermeasures against security and privacy risks in 5G applications.

RisksCountermeasuresRelated layer

eMBB scenario
 Failure of effective monitoring means(i) Application traffic monitoring at edge computing [63] nodes, suspension of high-risk services in specific cases(i) Network layer
 User privacy leakage risk(i) Perform secondary identity authentication and authorization between the terminal and the eMBB application service platform
(ii) negotiate and manage the service layer key to encrypt and protect user data
(iii) physical isolation or encryption
(iv) network slicing [55] or data dedicated line
(i) Terminal layer
(ii) network layer
(iii) service layer

uRLLC scenario
 DDoS attack risk(i) Two-way identity authentication between the user terminal and the application servers
(ii) deploy anti-DDoS capabilities
(i) Network layer
(ii) terminal layer
 Data security risk(i) Security capabilities deployed at edge computing [51], as well as data integrity protection, timestamp, serial number, etc. [18];(i) Network layer

mMTC scenario
 Counterfeit terminal(i) Using lightweight security algorithms [52, 53, 73], simple and efficient security protocols to implement two-way authentication(i) Terminal layer
 Data tampering and eavesdropping(i) Encrypt and protect the integrity of sensitive application data generated by IoT terminals [18](i) Terminal layer
 Remote control(i) Deploy security monitoring methods [68, 69] to timely detect and prevent massive IoT devices from being controlled(i) Terminal layer