Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Systematic Literature Review on 5G-IoT Security Aspects

Version 1 : Received: 6 November 2023 / Approved: 7 November 2023 / Online: 8 November 2023 (13:56:22 CET)

How to cite: Valadares, D.; Will, N.; Sobrinho, Á.; Lima, A.; Morais, I.; Santos, D. Systematic Literature Review on 5G-IoT Security Aspects. Preprints 2023, 2023110565. https://doi.org/10.20944/preprints202311.0565.v1 Valadares, D.; Will, N.; Sobrinho, Á.; Lima, A.; Morais, I.; Santos, D. Systematic Literature Review on 5G-IoT Security Aspects. Preprints 2023, 2023110565. https://doi.org/10.20944/preprints202311.0565.v1

Abstract

The 5G technology brings many benefits already known: large connection capacity, great transmission velocities, and low latencies with high reliability. One of its core services, the massive Machine Type Communication (mMTC), theoretically allows up to one million devices connected simultaneously in a square kilometer. As the Internet of Things (IoT) devices often have very restricted resources, hampering the adoption of robust security mechanisms, they can be targets for attackers aiming to explore vulnerabilities and gain access to the 5G infrastructure. Given this concern, it is essential to know existent vulnerabilities and possible threats and solutions related to 5G-IoT, the scenarios considering IoT devices connected to 5G infrastructures. For this reason, we carried out a systematic literature review, extracting and analyzing data from 142 selected papers from conferences and journals. As the main results, we present lists with known vulnerabilities, possible threats and solutions, and some recommendations.

Keywords

Internet of Things; 5G Networks; threats; vulnerabilities; mitigations

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.