Review of the Evaluating Authentication Approaches for Emerging Risks and Chaotic Systems in 5G Network Security

Main Article Content

Israa J. Mohammed Al-Kalfa, Jorge Munilla, Karam J. Mohammed, Mohammed Harbi Adhab, Abdulmajeed Al-Jumaily

Abstract

With previously unheard-of improvements in connection, latency reduction, and data transfer rates, 5G technology users are in a new age in mobile communications. From augmented reality and driverless cars to industrial automation and the Internet of Things (IoT), these capabilities have sparked a variety of applications. Making sure 5G networks are secured has become crucial as they become a part of vital infrastructures. The foundation for building trust between devices, people, and networks is authentication, which stands out among the other security features. The authentication mechanisms designed for 5G applications are examined in this review, focusing on how they let users, devices, and network infrastructure communicate securely. Additionally, it examines the evolving threat landscape, including impersonation, replay attacks, man-in-the-middle (MitM) attacks, and signaling storms, that target authentication.

Article Details

Section
Articles