A bibliometric approach to quantitatively assess current research trends in 5G security

PurposeAlongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting contributions made by the research community and identify research trends within different subdomains of 5G security where open issues still exist.Design/methodology/approachThis paper uses a bibliographic approach to review the state-of-the-art in the field of 5G security and is the pioneering effort to investigate 5G security research using this methodology. Specifically, the paper presents a quantitative description of the existing contributions in terms of authors, organizations, and countries. It then presents detailed keyword and co-citation analysis that shows the quantity and pattern of research work in different subfields. Finally, 5G security areas are identified having open challenges for future research work.FindingsThe study shows that China leads the world in terms of published research in the field of 5G security with USA and India ranked second and third respectively. Xidian University, China is ranked highest for number of publications and h-index followed by University Oulu and AALTO University Finland. IEEE Access, Sensors and IEEE Internet of Things Journal are the top publication venues in the field of 5G security. Using VOSViewer aided analysis with respect to productivity, research areas and keywords, the authors have identified research trends in 5G security among scientific community whilst highlighting specific challenges which require further efforts.Originality/valueExisting studies have focused on surveys covering state-of-the art research in secure 5G network (Zhang et al. 2019), physical layer security (Wu et al., 2018), security and privacy of 5G technologies (Khan et al., 2020) and security and privacy challenges when 5G is used in IoT (Sicari et al. 2020). However, our research has revealed no existing bibliometric studies in this area and therefore, to our best knowledge, this paper represents pioneering such effort for security within 5G.

[1]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[2]  Chaomei Chen,et al.  The proximity of co-citation , 2011, Scientometrics.

[3]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[4]  Tanesh Kumar,et al.  Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.

[5]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.

[6]  Emmanuel Bertin,et al.  A survey on authentication and access control for mobile networks: from 4G to 5G , 2019, Annals of Telecommunications.

[7]  Hui Li,et al.  A Survey on Security Aspects for 3GPP 5G Networks , 2020, IEEE Communications Surveys & Tutorials.

[8]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[9]  Xihua Liu,et al.  Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks , 2019, Mobile Networks and Applications.

[10]  Adlen Ksentini,et al.  Toward Slicing-Enabled Multi-Access Edge Computing in 5G , 2020, IEEE Network.

[11]  Jisun Jung International Research Collaboration among Academics in China and South Korea , 2012 .

[12]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[13]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[14]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[15]  Ying Ding,et al.  Scientific collaboration and endorsement: Network analysis of coauthorship and citation networks , 2011, J. Informetrics.

[16]  Yongjun Ren,et al.  Blockchain-based trust establishment mechanism in the internet of multimedia things , 2020, Multimedia Tools and Applications.

[17]  Andrei Gurtov,et al.  Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.

[18]  Prabhakar Krishnan,et al.  A lightweight authentication scheme for 5G mobile communications: a dynamic key approach , 2021, Journal of Ambient Intelligence and Humanized Computing.

[19]  Sabrina Sicari,et al.  5G In the internet of things era: An overview on security and privacy challenges , 2020, Comput. Networks.

[20]  Ludo Waltman,et al.  Software survey: VOSviewer, a computer program for bibliometric mapping , 2009, Scientometrics.

[21]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[22]  Yan Xu,et al.  Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks , 2020, IEEE Transactions on Vehicular Technology.

[23]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[24]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[25]  Jean Pierre Courtial,et al.  A coword analysis of scientometrics , 1994, Scientometrics.

[26]  Shunliang Zhang,et al.  Towards secure 5G networks: A Survey , 2019, Comput. Networks.

[27]  Georgios Mantas,et al.  Key Management for Beyond 5G Mobile Small Cells: A Survey , 2019, IEEE Access.

[28]  Sanjeev Jain,et al.  Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.

[29]  Jean Pierre Courtial,et al.  Historical scientometrics? Mapping over 70 years of biological safety research with coword analysis , 1993, Scientometrics.

[30]  Ying-Chang Liang,et al.  Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[31]  Emmanuel Bertin,et al.  5G-SSAAC: Slice-specific Authentication and Access Control in 5G , 2019, 2019 IEEE Conference on Network Softwarization (NetSoft).

[32]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[33]  Zibin Zheng,et al.  Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.

[34]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[35]  Lin Zhang,et al.  A privacy preserving scheme for vehicle-to-everything communications using 5G mobile edge computing , 2020, Comput. Networks.

[36]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[37]  Diana Pamela Moya Osorio,et al.  Survey on physical layer security for 5G wireless networks , 2020, Annals of Telecommunications.

[38]  Henry G. Small,et al.  Co-citation in the scientific literature: A new measure of the relationship between two documents , 1973, J. Am. Soc. Inf. Sci..

[39]  Johan A. Wallin,et al.  The bibliometric analysis of scholarly production: How great is the impact? , 2015, Scientometrics.

[40]  Bo Yi,et al.  A comprehensive survey of Network Function Virtualization , 2018, Comput. Networks.

[41]  Vahid Garousi,et al.  A systematic literature review of literature reviews in software testing , 2016, Inf. Softw. Technol..

[42]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[43]  Min Chen,et al.  Cognitive Internet of Vehicles , 2018, Comput. Commun..

[44]  Ruxandra F. Olimid,et al.  5G Network Slicing: A Security Overview , 2020, IEEE Access.

[45]  Min Chen,et al.  Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.

[46]  S. N. Singh,et al.  Mapping the intellectual structure of scientometrics: a co-word analysis of the journal Scientometrics (2005–2010) , 2014, Scientometrics.

[47]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[48]  Nor Badrul Anuar,et al.  The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..