Market Dynamics and Security Considerations of 5G
DOI:
https://doi.org/10.13052/jicts2245-800X.532Keywords:
5G, IoT, 5G Security, NFV, IIoTAbstract
The 5th Generation (5G) of mobile communication systems will bring massive changes in the dynamics of the Information and Communication Technology (ICT) industry. The applications of 5G technology are well-positioned to address the ever-increasing demand for enhanced service experience. With digitization on its way to touch every part of life, Internet of Things (IoT) will be integral part of 5G from the very beginning; this is unlike 4G where IoT came later. However, open issues such as market demand, technical viability, economic feasibility of adopting 5G and related business dynamics do exist. This paper discusses such issues and more importantly, the security considerations in the world where everything will be connected.
Downloads
References
Alliance, N. G. M. N. 5G white paper. “Next generation mobile networks, white paper” (2015).
NEC, “Making 5G a Reality.” http://www.nec.com, 22-Feb-2018. [Online]. Available: http://www.nec.com/en/global/solutions/nsp/5g_vis ion/doc/wp2018ar.pdf. [Accessed: 12-Mar-2018].
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., and Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617–1634.
Li, Yong, and Min Chen. “Software-defined network function virtualization: A survey.” IEEE Access 3 (2015): 2542–2553.
Koponen, Teemu, Keith Amidon, Peter Balland, Martín Casado, Anupam Chanda, Bryan Fulton, Igor Ganichev et al. (2014). “Network Virtualization in Multi-tenant Datacenters.” In NSDI, vol. 14, pp. 203–216.
ETSI, “Network Functions Virtualisation (NFV); Management and Orchestration”, ETSI GS NFV-MAN 001 v.1.1.1, 2014.
3GPP, “Service requirements for machine-type communications,” 3GPP TS 22.368 V13.0.0, 2014.
GSMA Intelligence, “The future of the SIM: Potential market and technology implications for the mobile ecosystem”, (2017)
GSMA Intelligence, “Understanding SIM evolution”, (2015)
European Telecommunications Standards Institute, “Mobile Edge Computing – A key technology towards 5G”, ETSI White Paper No. 11, (2015)
Hong, Xuemin, Jing Wang, Cheng-Xiang Wang, and Jianghong Shi (2014). “Cognitive radio in 5G: a perspective on energy-spectral efficiency trade-off.” IEEE Communications Magazine 52(7), 46–53.
Galinina, Olga, Alexander Pyattaev, Sergey Andreev, Mischa Dohler, and Yevgeni Koucheryavy (2015). “5G multi-RAT LTE-WiFi ultra-dense small cells: Performance dynamics, architecture, and trends.” IEEE Journal on Selected Areas in Communications, 33(6) 1224–1240.
Asadi, Arash, Qing Wang, and Vincenzo Mancuso. “A survey on device-to-device communication in cellular networks.” IEEE Communications Surveys & Tutorials 16.4 (2014): 1801–1819.
3GPP, “Study on isolated Evolved Universal Terrestrial Radio Access Network (E-UTRAN) operation for public safety,” 3GPP TS 22.897 v13.0.0, 2014
3GPP, “Isolated Evolved Universal Terrestrial Radio Access Network (E-UTRAN) operation for public safety; Stage 1,” 3GPP TS 22.346 v14.0.0, 2017
Palattella, M. R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., and Ladid, L. (2016). Internet of things in the 5G era: Enablers, architecture, and business models. IEEE Journal on Selected Areas in Communications, 34(3), 510–27.
Sun, S., Kadoch, M., Gong, L., and Rong, B. (2015). Integrating network function virtualization with SDR and SDN for 4G/5G networks. IEEE Network, 29(3), 54–59.
Niu, Y., Li, Y., Jin, D., Su, L., and Vasilakos, A. V. (2015). A survey of millimeter wave communications (mmWave) for 5G: opportunities and challenges. Wireless Networks, 21(8), 2657–2676.
Zhang, Haijun, Yanjie Dong, Julian Cheng, Md Jahangir Hossain, and Victor CM Leung. “Fronthauling for 5G LTE-U ultra dense cloud small cell networks.” IEEE Wireless Communications, 23(6), (2016): 48–53.
McKenna, Timothy P., Juan C. Juarez, Jeffrey A. Nanzer, and Thomas R. Clark (2013). “Hybrid millimeter-wave/free-space optical system for high data rate communications.” In Photonics Conference (IPC), 2013 IEEE, pp. 203–204. IEEE
Wei, Lili, Rose Qingyang Hu, Yi Qian, and Geng Wu (2014). “Key elements to enable millimeter wave communications for 5G wireless systems.” IEEE Wireless Communications, 21(6), 136–143.
Akhtar, Auon Muhammad, Xianbin Wang, and Lajos Hanzo (2016). “Synergistic spectrum sharing in 5G HetNets: A harmonized SDN-enabled approach.” IEEE Communications Magazine 54(1), 40–47.
GSM Alliance, “Remote Provisioning Architecture for Embedded UICC,” GSM Alliance, SGP.02 v3.1, 2016.
GSM Alliance, “Embedded SIM Remote Provisioning Architecture,” GSM Alliance, 12FAST.13 v1.1, 2013.
Palattella, Maria Rita, Pascal Thubert, Xavier Vilajosana, Thomas Watteyne, Qin Wang, and Thomas Engel (2014). “6tisch wireless industrial networks: Determinism meets ipv6.” In Internet of Things, pp. 111–141. Springer, Cham.
Rost, Peter, Albert Banchs, Ignacio Berberana, Markus Breitbach, Mark Doll, Heinz Droste, Christian Mannweiler, Miguel A. Puente, Konstantinos Samdanis, and Bessem Sayadi (2016). “Mobile network architecture evolution toward 5G.” IEEE Communications Magazine, 54(5) 84–91.
Wollschlaeger, Martin, Thilo Sauter, and Juergen Jasperneite (2017). “The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0.” IEEE Industrial Electronics Magazine, 11(1), 17–27.
Xiang, Wei, Kan Zheng, and Xuemin Sherman Shen, eds. 5G mobile communications. Springer, 2016.
Firoozjaei, Mahdi Daghmehchi, Jaehoon Paul Jeong, Hoon Ko, and Hyoungshick Kim. (2017). “Security challenges with network functions virtualization.” Future Generation Computer Systems 67, 315–324.
Fall, Kevin R., and W. Richard Stevens. TCP/IP illustrated, volume 1: The protocols. addison-Wesley, 2011.
Stallings, William, and Moumita Mitra Manna. Operating systems: internals and design principles. Pearson, 2015.
Almorsy, Mohamed, John Grundy, and Ingo Müller (2016). “An analysis of the cloud computing security problem.” arXiv preprint arXiv:1609.01107.
Singh, Ashish, and Kakali Chatterjee (2017). “Cloud security issues and challenges: A survey.” Journal of Network and Computer Applications 79, 88–115.
ETSI, “Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance”, ETSI GS NFV-SEC 003 v.1.1.1, 2014.
ETSI, “Network Functions Virtualisation (NFV) Release 3; NFV Security; Security Specification for MANO Components and Reference points”, ETSI GS NFV-SEC 014 v0.0.15, 2018
Baldini, Gianmarco, Taj Sturman, Abdur Rahim Biswas, Ruediger Leschhorn, Gyozo Godor, and Michael Street (2012). “Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead.”IEEE Communications Surveys & Tutorials 14(2), 355–379.
Roh, Wonil, Ji-Yun Seol, Jeongho Park, Byunghwan Lee, Jaekon Lee, Yungsoo Kim, Jaeweon Cho, Kyungwhoon Cheun, and Farshid Aryanfar (2014). “Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results.” IEEE communications magazine 52(2), 106–113.
Park, Jung-Min, Jeffrey H. Reed, A. A. Beex, T. Charles Clancy, Vireshwar Kumar, and Behnam Bahrak (2014). “Security and enforcement in spectrum sharing.” Proceedings of the IEEE, 102(3), 270–281.
Lipp, Moritz, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. “Meltdown.”arXiv preprint arXiv:1801.01207 (2018).
Goel, Diksha, and Ankit Kumar Jain. “Mobile phishing attacks and defence mechanisms: state of art and open research challenges.” Computers & Security (2017).
3GPP, “Study on the security aspects of the next generation system,” 3GPP TR 33.899 v1.3.0, 2017.
3GPP, “Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2 (Release 15),” 3GPP TS 38.300 v15.0.0, 2018.
3GPP, “Technical Specification Group Radio Access Network; NG-RAN; Architecture description (Release 15),” 3GPP TS 38.401 v15.0.0, 2018.