Study on Security and Privacy in 5G-Enabled Applications
Table 6
Conclusions of the paper.
No.
Contributions
Results
1
Summarizes the technical characteristics and typical application scenarios of 5G
(a) The features summarization introduced by new technologies (b) vertical applications introduction: (i) smart manufacturing (ii) smart traffic (iii) smart grids (iv) smart campus
2
Analyzes the security and privacy risks faced by 5G applications
(a) General security risks analysis in 5G applications (b) 5G specific risks analysis in typical usage scenarios: (i) privacy leakage in the eMBB scenario (ii) DDoS attacks in the uRLLC scenario. (iii) remote control in the mMTC scenario
3
Analyzes the existing work for 5G application security
(a) Security standards introduction on 5G applications (b) authentications analysis in 5G applications: (i) secondary authentications for industry customers (ii) three-factor authentications for mobile lightweight devices (c) other research focuses analysis: (i) MEC (ii) network slicing
4
Analyzes the reference architecture and summarizes security solutions for 5G applications
(a) The system reference architecture analysis (b) security and privacy solutions: (i) solutions on terminal layer (ii) solutions on network layer (iii) solutions on platform layer (iv) solutions on service layer
5
Summarizes security measures in typical scenarios and proposes specific suggestions
(a) Specific suggestions for security and privacy: (i) secure deployment of edge node in eMBB scenario (ii) preventing data from various attacks in uRLLC scenario (iii) lightweight equipment authentication in mMTC scenario
6
Provides a use case of industrial terminal access control
(a) The description of the use case and its security requirements (b) terminal access control solutions