A Comprehensive Analysis of Security Mechanisms in 5G Communication Systems

Author(s):1Kamaldeep Kaur, 2Sabhyata Uppal Soni, 3Sarpreet Kaur

Affiliation: 1Research Scholar, UIET, Panjab University, Chandigarh, India 2,3Assistant Professor, UIET, Panjab University, Chandigarh, India

Page No: 24-38

Volume issue & Publishing Year: Volume 2 Issue 11,Nov-2025

Journal: International Journal of Advanced Multidisciplinary Application.(IJAMA)

ISSN NO: 3048-9350

DOI: https://zenodo.org/records/17746571

Download PDF

Article Indexing:

Abstract:
Wireless communication systems have been at risk of security attacks right from the very beginning. The first-generation wireless networks saw mobile phones and wireless channels as targets for illegal cloning and masquerading. The second generation of wireless networks was characterized by message spamming that became common not only for pervasive attacks but also injecting false information or broadcasting unwanted marketing information.Almost every security threat in 5G networks uses LTE weaknesses as a loophole. Some of them are illegal data consumption, target-type network device denial of service (DoS), information leaks, and audio eavesdropping. The various schemes to improve security of 5G network is proposed in the previous years. In this paper, various many techniques are analysed which in terms of certain parameters which can improve security of 5 G network.

Keywords: Security Analysis, 5G, LTS, Software defined networks

Reference:

  • [1] Y. Duan, Q. Wu, X. Zhao, and X. Li, “Mobile edge computing based cognitive network security analysis using multi agent machine learning techniques in B5G,” Computers & Electrical Engineering, vol. 117, pp. 109181–109181, Jul. 2024, doi: https://doi.org/10.1016/j.compeleceng.2024.109181.
  • [2] S. Gupta and Sonia, "An Analysis of Edge Computing with Multi Access in 5-G Technology," 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2023, pp. 1641-1644, doi: 10.1109/ICACITE57410.2023.10183311.
  • [3] S. Wijethilaka, A. Kumar Yadav, A. Braeken and M. Liyanage, "Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing," in IEEE Transactions on Network and Service Management, vol. 21, no. 4, pp. 3988-4005, Aug. 2024, doi: 10.1109/TNSM.2024.3416418
  • [4] T. Saha, N. Aaraj and N. K. Jha, "Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems," in IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 4, pp. 2006-2024, 1 Oct.-Dec. 2022, doi: 10.1109/TETC.2022.3147192.
  • [5] A. K. Bhagat and J. Gandhi, "A Comprehensive Analysis of 5G Security Core Technologies and Services: Conceptual Frameworks, Challenges, and Solutions," 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 2023, pp. 1273-1281, doi: 10.1109/AISC56616.2023.10085449.
  • [6] M. A. Hasnat, S. T. A. Rumee, M. A. Razzaque and M. Mamun-Or-Rashid, "Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future Direction," 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox'sBazar, Bangladesh, 2019, pp. 1-4, doi: 10.1109/ECACE.2019.8679326.
  • [7] S. Gupta, B. L. Parne and N. S. Chaudhari, "Security Vulnerabilities in Handover Authentication Mechanism of 5G Network," 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 2018, pp. 369-374, doi: 10.1109/ICSCCC.2018.8703355.
  • [8] V. Adat Vasudevan, C. Tselios and I. Politis, "On Security Against Pollution Attacks in Network Coding Enabled 5G Networks," in IEEE Access, vol. 8, pp. 38416-38437, 2020, doi: 10.1109/ACCESS.2020.2975761.
  • [9] V. Adat, I. Politis, C. Tselios, P. Galiotos and S. Kotsopoulos, "On Blockchain Enhanced Secure Network Coding for 5G Deployments," 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 1-7, doi: 10.1109/GLOCOM.2018.8647581.
  • [10] A. Bozorgchenani et al., "Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach," in IEEE Transactions on Network Science and Engineering, vol. 11, no. 3, pp. 3039-3052, May-June 2024, doi: 10.1109/TNSE.2024.3358170.
  • [11] M. S. Siddiqui et al., "Policy based virtualised security architecture for SDN/NFV enabled 5G access networks," 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto, CA, USA, 2016, pp. 44-49, doi: 10.1109/NFV-SDN.2016.7919474.
  • [12] R. Khan, P. Kumar, D. N. K. Jayakody and M. Liyanage, "A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions," in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 196-248, Firstquarter 2020, doi: 10.1109/COMST.2019.2933899.
  • [13] WojciechNiewolski, T. W. Nowak, MariuszSepczuk, and Z. Kotulski, “Security architecture for authorized anonymous communication in 5G MEC,” Journal of Network and Computer Applications, vol. 218, pp. 103713–103713, Sep. 2023, doi: https://doi.org/10.1016/j.jnca.2023.103713.
  • [14] H. Sharma and N. Kumar, “Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey,” Physical Communication, vol. 57, p. 102002, Apr. 2023, doi: https://doi.org/10.1016/j.phycom.2023.102002.
  • [15] T. Madi, H. A. Alameddine, M. Pourzandi, and A. Boukhtouta, “NFV security survey in 5G networks: A three-dimensional threat taxonomy,” Computer Networks, vol. 197, p. 108288, Oct. 2021, doi: https://doi.org/10.1016/j.comnet.2021.108288.
  • [16] G. Amponis et al., “Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks,” AEU - International Journal of Electronics and Communications, vol. 171, pp. 154913–154913, Nov. 2023, doi: https://doi.org/10.1016/j.aeue.2023.154913.
  • [17] M. S. P. Durgarao, D. Valluru, S. Saraswathi, P. Malathi, K. Thilagam and S. Loganathan, "A security framework for 5G-enabled wireless sensor networks based on blockchain technology," 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chikkaballapur, India, 2024, pp. 1-6, doi: 10.1109/ICKECS61492.2024.10617316.
  • [18] S. Wijethilaka, A. Kumar Yadav, A. Braeken and M. Liyanage, "Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing," in IEEE Transactions on Network and Service Management, vol. 21, no. 4, pp. 3988-4005, Aug. 2024, doi: 10.1109/TNSM.2024.3416418.
  • [19] S. M. Karim, A. Habbal, S. A. Chaudhry and A. Irshad, "BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment," in IEEE Access, vol. 11, pp. 36158-36175, 2023, doi: 10.1109/ACCESS.2023.3265959
  • [20] E. S. Babu, A. Barthwal, and R. Kaluri, “Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks,” Computer Communications, vol. 199, pp. 10–29, Feb. 2023, doi: https://doi.org/10.1016/j.comcom.2022.12.00
  • [21] A. Qasem and Ashraf Tahat, “Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks,” Simulation Modelling Practice and Theory, pp. 102998–102998, Jul. 2024, doi: https://doi.org/10.1016/j.simpat.2024.102998.
  • [22] N. A. E. Kuadey, G. T. Maale, T. Kwantwi, G. Sun and G. Liu, "DeepSecure: Detection of Distributed Denial of Service Attacks on 5G Network Slicing—Deep Learning Approach," in IEEE Wireless Communications Letters, vol. 11, no. 3, pp. 488-492, March 2022, doi: 10.1109/LWC.2021.3133479
  • [23] T. Le and S. Shetty, “Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks,” Ad Hoc Networks, vol. 126, p. 102752, Mar. 2022, doi: https://doi.org/10.1016/j.adhoc.2021.102752.
  • [24] S. Rathore, J. H. Park and H. Chang, "Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT," in IEEE Access, vol. 9, pp. 90075-90083, 2021, doi: 10.1109/ACCESS.2021.3077069.
  • [25] Z. G. Al-Mekhlafi et al., "Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications," in IEEE Access, vol. 12, pp. 71232-71247, 2024, doi: 10.1109/ACCESS.2024.3402336.
  • [26] WojciechNiewolski, T. W. Nowak, MariuszSepczuk, and Z. Kotulski, “Security architecture for authorized anonymous communication in 5G MEC,” Journal of Network and Computer Applications, vol. 218, pp. 103713–103713, Sep. 2023, doi: https://doi.org/10.1016/j.jnca.2023.103713.
  • [27] O. Nait-Hamoud, T. Kenaza, and Y. Challal, “Certificateless Public Key Systems Aggregation: An enabling technique for 5G multi-domain security management and delegation,” Computer Networks, vol. 199, p. 108443, Nov. 2021, doi: https://doi.org/10.1016/j.comnet.2021.108443
  • [28] B. Ying and A. Nayak, “Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography,” Journal of Network and Computer Applications, vol. 131, pp. 66–74, Apr. 2019, doi: https://doi.org/10.1016/j.jnca.2019.01.017.