Submitted:
24 February 2025
Posted:
25 February 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. The Generations of Broadband Wireless Networks
| Technology | 1G | 2G/2.5G | 3G | 4G | 5G |
|---|---|---|---|---|---|
| Deployment | 1970/1984 | 1970/1999 | 1990/2002 | 2000/2010 | 2014/2015 |
| Bandwidth | 2kbps | 14-64 kbps | 2 Mbps | 200 Mbps | > 1gbps |
| Technology | Analog Cellular | Digital Cellular | Broad bandwidth CDMA/IP technology | Unified IP & seamless | 4G + WWWW |
| Service | Mobile telephony | Digital voice, short messaging | Integrated high-quality audio, video, and data | Dynamic information access, variable devices | Dynamic information access, variable drivers with AI capabilities |
| Multiplexing | FDMA | TDMA/CDMA | CDMA | CDMA | CDMA |
| Standards | AMPS, TACS, NMT, etc. | TDMA, CDMA, PDC EDGE | WCDMA, CDMA2000 | Single standard | 3GGP |
| Switching | Circuit | Circuit/ circuit for access network & air interface | Packet except for air interface | All packet | All packet |
| Core Network | PSTN | PSTN | Packet network | Internet | Internet |
| Handoff | Horizontal | Horizontal | Horizontal | Horizontal & Vertical | Horizontal & Vertical |
3. Internet of Things for 5G-Related Smart Technologies

3.1. Key Points About 5G and IoT
- Enhanced connectivity
- Real-time applications
- Massive Machine-Type Communication (mMTC)
3.2. Examples of Broadband 5G IoT Applications
- Smart Manufacturing: Monitoring machine health, optimizing production lines, and real-time quality control.
- Smart Cities: Traffic management, environmental monitoring, street lighting control.
- Connected Healthcare: Remote patient monitoring, wearable devices, and real-time medical data analysis.
- Logistics and Supply Chain: Tracking assets and optimizing delivery routes.
3.3. Facilitation of IoT Using Broadband 5G
- Network Slicing:
- Edge Computing
- Improved Power Efficiency
4. IoT and Smart Cities

5. The Importance of Providing IoT Security in Future Generations of Smart Systems
6. Possible Attacks Challenges on IoT Systems
- Sybil Attack
- Sleep Deprivation Attack
- Denial of Service
- Man-in-the-Middle
- Malicious Code Injection

7. The IoT Security Solutions for Future Generations of Smart Systems
7.1. The Key Aspects of the 5G Security Solutions that Are Pertinent to IoT Security Solutions Are as Follows:
- Encryption
- Authentication
- Network Slicing
- Device Identity Verification
- Key Management
- Threat Detection and Response
- Location Privacy
- Zero Trust Network Architecture
7.2. Other Solutions for Security Issues with IoT
- Trust, Privacy, and Security
- Logistic Regression
- Proper Application
- Improved defensive measures
- Implementing defense practices
8. Recommendations
- It must be designed to adapt to future generations of technologies, such as 5G and beyond.
- The IoT standard must ensure scalability and versatility, offering enough capacity and network efficiency to connect millions of devices while providing advanced features—such as longer battery life and a wider coverage area—to expand new use cases.
- The IoTs of the future must have the latest advances and developments in algorithms, schemes, and architectures for adequate privacy and cybersecurity application issues.
- The IoT security solutions should closely follow the security solutions for 5G and beyond broadband communication systems.
- To achieve a vision in which millions of devices are connected smartly, the IoT standard must ensure both scalability and versatility, offering enough capacity and network efficiency to connect millions of devices while also providing advanced features—such as longer battery life and a wider coverage area—to facilitate the expansion of new use cases.
- The smart IoT of the future must require new network capabilities to support a massive number of smart devices and efficient software and hardware platforms for both devices and networks.
- The future IoT should require close partnerships among many industries and ecosystems to offer integrated computing and communication capabilities.
- IoT of the future must consider privacy, security, and trust issues in its cyber security framework.
9. Conclusion
References
- Connected Things, IoT & 5G by Dr.-Ing. Eueung Mulyana https://eueung.github.io/ET3010).
- Available online: http://postscapes.com/what-exactly-is-the-internet-of-things-infographic.
- Li, Shancang, Li Da Xu, and Shanshan Zhao. "5G Internet of Things: A survey." Journal of Industrial Information Integration 10 (2018): 1-9. [CrossRef]
- J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device–to–device communication in LTE–advanced networks: A survey, IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 19231940, 2015. [CrossRef]
- Rahimi, Hamed, Ali Zibaeenejad, and Ali Akbar Safavi. "A Novel IoT Architecture based on 5G-IoT and Next Generation Technologies." 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2018.
- Ahmed, Rizwan, et al. "Comprehensive Survey of Key Technologies Enabling 5G-IoT." Available at SSRN 3351007 (2019).
- Kramp, Thorsten & Kranenburg, Rob & Lange, Sebastian. (2013). Introduction to the Internet of Things. 2013. [CrossRef]
- Shahram G.N. Reshaping mobile broadband with 5G communication technologies, 5G World Summit, 2014.
- Connected Things, IoT & 5G by Dr.-Ing. Eueung Mulyana. Available online: https://eueung.github.io/ET3010.
- Li, Shancang, Li Da Xu, and Shanshan Zhao. "5G Internet of Things: A survey." Journal of Industrial Information Integration 10 (2018): 1-9. [CrossRef]
- Rahimi, Hamed, Ali Zibaeenejad, and Ali Akbar Safavi. "A Novel IoT Architecture based on 5G-IoT and Next Generation Technologies." 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2018.
- Ahmed, Rizwan, et al. "Comprehensive Survey of Key Technologies Enabling 5G-IoT." Available at SSRN 3351007 (2019).
- Smart Cities. Available online: https://commission.europa.eu/eu-regional-and-urban-development/topics/cities-and-urban-development/city-initiatives/smart-cities (accessed on 20 February 2025).
- Available online: https://www.researchgate.net/figure/nternet-of-Things-prediction-from-2014-to-2025-in-billions_fig2_339121533.
- Abdullah, R. Hamad, M. Abdulrahman, H. Moala, and S. Elkhediri, "CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges, and Techniques," in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, 2019.
- Sharma and N. K. Gondhi, "Communication Protocol Stack for Constrained IoT Systems," in 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, 2018.
- L. Liang, K. Zheng, Q. Sheng and X. Huang, "A Denial of Service Attack Method for an IoT System," in 2016 8th International Conference on Information Technology in Medicine and Education (ITME), Fuzhou, 2016.
- Kepçeoğlu, A. Murzaeva and S. Demirci, "Performing energy consuming attacks on IoT devices," in 2019 27th Telecommunications Forum (TELFOR), Belgrade, 2019.
- L. Huraj, M. Simon and T. Horák, "IoT Measuring of UDP-Based Distributed Reflective DoS Attack," in 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, 2018.
- J. R. C. Nurse, P. Radanliev, S. Creese and D. D. Roure, "If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems," in Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018.
- V. B. Reddy, A. Negi, S. Venkataraman, and V. R. Venkataraman, "A Similarity-based Trust Model to Mitigate Badmouthing Attacks in the Internet of Things (IoT)," in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, 2019.
- U. M. Mbanaso and G. A. Chukwudebe, "Requirement analysis of IoT security in distributed systems," in 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), Owerri, 2017.
- R. Gurunath, M. Agarwal, A. Nandi and D. Samanta, "An Overview: Security Issue in IoT Network," in 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, 2018.
- A. O. Prokofiev, Y. S. Smirnova, and V. A. Surov, “A Method to Detect Internet of Things Botnets,” in 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, 2018.
- N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum and N. Ghani, “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations,” IEEE Communications Surveys & Tutorials ( Volume: 21 , Issue: 3 , third quarter 2019 ), vol. 21, no. 3, pp. 2702-2733, 11 April 2019. [CrossRef]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).