Research Article

Study on Security and Privacy in 5G-Enabled Applications

Table 6

Conclusions of the paper.

No.ContributionsResults

1Summarizes the technical characteristics and typical application scenarios of 5G(a) The features summarization introduced by new technologies
(b) vertical applications introduction:
(i) smart manufacturing
(ii) smart traffic
(iii) smart grids
(iv) smart campus

2Analyzes the security and privacy risks faced by 5G applications(a) General security risks analysis in 5G applications
(b) 5G specific risks analysis in typical usage scenarios:
(i) privacy leakage in the eMBB scenario
(ii) DDoS attacks in the uRLLC scenario.
(iii) remote control in the mMTC scenario

3Analyzes the existing work for 5G application security(a) Security standards introduction on 5G applications
(b) authentications analysis in 5G applications:
(i) secondary authentications for industry customers
(ii) three-factor authentications for mobile lightweight devices
(c) other research focuses analysis:
(i) MEC
(ii) network slicing
4Analyzes the reference architecture and summarizes security solutions for 5G applications(a) The system reference architecture analysis
(b) security and privacy solutions:
(i) solutions on terminal layer
(ii) solutions on network layer
(iii) solutions on platform layer
(iv) solutions on service layer

5Summarizes security measures in typical scenarios and proposes specific suggestions(a) Specific suggestions for security and privacy:
(i) secure deployment of edge node in eMBB scenario
(ii) preventing data from various attacks in uRLLC scenario
(iii) lightweight equipment authentication in mMTC scenario

6Provides a use case of industrial terminal access control(a) The description of the use case and its security requirements
(b) terminal access control solutions