Data Security and Privacy in 5G-Enabled IoT

2021 
Internet is a major communication medium for sharing data, audios, videos for various services like retrieval of information, online shopping, video streaming, online financial transactions (like banking, online trading, etc.), social networking, and others. This communication and connection through the Internet is extended up to the connection of various sensors and electronic devices and makes a system called as Internet of Things (IoT) (Gubbi et al., Future Gener Comput Syst 29(7):1645–1660, 2013). The objective of IoT is to share the information not only from the user but also from the various devices and is believed to provide the basis of the next Internet and Web 3.0. When a number of users, devices and sensors are connected to each others which could be potentially connected to the Internet, and the scale of connection will be increased which is required as the amount of traffic will be increased. The Internet is provided by various mediums, and now the world is forwarding its backbone of communication from 4G to 5G mobile network. To manage this huge traffic, there is a requirement of the various management protocols, and it is necessary to reconsider the underlying protocols that will support the Internet of Things. The security and privacy should be addressed in every layer in designing of the fog computing system (Pham and Huh, Towards task scheduling in a cloud-fog computing system. In: 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, Piscataway, 2016, pp 1–4). It becomes more important when the data is directly related to health issues through various e-health care services. It may include various security services like authentication, secrecy, authorization, etc. On the other hand, various security problems also need to explain as Trust and Authentication, Rogue Fog Node (Al-Otaibi et al., Sensors 19(4):965, 2019), Secure Data Storage, etc. The development, emergence, and implementation of the 5G network will enable the connectivity of the various devices and sensors to strengthen the data exchange for IoT in our daily lives as in transportation, health care, environmental monitoring, etc. This huge scale of interconnection will create another challenge for the developers of security and privacy. While the development of 5G-enabled IoT system (Li et al., J. Ind. Inf. Integr. 10:1–9, 2018) is important for the welfare of society but at the same pace, security and privacy are also equally important for the system. This chapter will present the various security fundamentals for IoT-enabled 5G networks, Security Threats, and Privacy Threats. The analysis of the security and privacy for specific fields is also analyzed. Then, the Challenges and Opportunities are discussed with the discussion of services that need to be secure. Finally, some case studies are also discussed.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    43
    References
    0
    Citations
    NaN
    KQI
    []