Next Article in Journal
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism
Previous Article in Journal
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Introduction of a Modular Framework for Securing 5G Networks and Beyond

1
School of Science and Technology, Department of Computer Science, Middlesex University, London NW4 4BT, UK
2
School of Computing and Engineering, University of West London, London W5 5RF, UK
*
Author to whom correspondence should be addressed.
Network 2022, 2(3), 419-439; https://doi.org/10.3390/network2030026
Submission received: 21 June 2022 / Revised: 13 July 2022 / Accepted: 18 July 2022 / Published: 22 July 2022

Abstract

Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This will enable the new use cases to provide access to other services within the network and from third-party service providers (SPs). End-users with their user equipment (UE) will be able to access services ubiquitously from multiple SPs that might share infrastructure and security management, whereby implementing security from one domain to another will be a challenge. This highlights a need for a new and effective security approach to address the security of such a complex system. This article proposes a network service security (NSS) modular framework for 5G and beyond that consists of different security levels of the network. It reviews the security issues of D2D communications in 5G, and it is used to address security issues that affect the users and SPs in an integrated and heterogeneous network such as the 5G enabled D2D communications network. The conceptual framework consists of a physical layer, network access, service and D2D security levels. Finally, it recommends security mechanisms to address the security issues at each level of the 5G-enabled D2D communications network.
Keywords: network services; access; security; framework; device to device; communication; 5G network services; access; security; framework; device to device; communication; 5G

Share and Cite

MDPI and ACS Style

Edris, E.K.K.; Aiash, M.; Loo, J. An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network 2022, 2, 419-439. https://doi.org/10.3390/network2030026

AMA Style

Edris EKK, Aiash M, Loo J. An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network. 2022; 2(3):419-439. https://doi.org/10.3390/network2030026

Chicago/Turabian Style

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. 2022. "An Introduction of a Modular Framework for Securing 5G Networks and Beyond" Network 2, no. 3: 419-439. https://doi.org/10.3390/network2030026

APA Style

Edris, E. K. K., Aiash, M., & Loo, J. (2022). An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network, 2(3), 419-439. https://doi.org/10.3390/network2030026

Article Metrics

Back to TopTop