Study on Security and Privacy in 5G-Enabled Applications
Table 5
Countermeasures against security and privacy risks in 5G applications.
Risks
Countermeasures
Related layer
eMBB scenario
Failure of effective monitoring means
(i) Application traffic monitoring at edge computing [63] nodes, suspension of high-risk services in specific cases
(i) Network layer
User privacy leakage risk
(i) Perform secondary identity authentication and authorization between the terminal and the eMBB application service platform (ii) negotiate and manage the service layer key to encrypt and protect user data (iii) physical isolation or encryption (iv) network slicing [55] or data dedicated line
(i) Terminal layer (ii) network layer (iii) service layer
uRLLC scenario
DDoS attack risk
(i) Two-way identity authentication between the user terminal and the application servers (ii) deploy anti-DDoS capabilities
(i) Network layer (ii) terminal layer
Data security risk
(i) Security capabilities deployed at edge computing [51], as well as data integrity protection, timestamp, serial number, etc. [18];
(i) Network layer
mMTC scenario
Counterfeit terminal
(i) Using lightweight security algorithms [52, 53, 73], simple and efficient security protocols to implement two-way authentication
(i) Terminal layer
Data tampering and eavesdropping
(i) Encrypt and protect the integrity of sensitive application data generated by IoT terminals [18]
(i) Terminal layer
Remote control
(i) Deploy security monitoring methods [68, 69] to timely detect and prevent massive IoT devices from being controlled