5G: Evolution of a secure mobile technology

The mobile technology is an ever evolving concept. The world has seen various generations of mobile technology be it 1G, 2G, 3G or 4G. The fifth generation of mobile technology i.e. 5G is seen as a futuristic notion that would help in solving the issues that are pertaining in the 4G. In this paper we have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabilities and privacy concerns. We have also highlighted how the notions of 5G can be tailored to provide a more secure mobile computing environment. We have considered the futuristic architectural framework for 5G networks in our discussion. The basic concepts and features of the fifth generation technology are explained here. We have also analyzed five pillars of strength for the 5G network security which would work in collaboration with each other to provide a secure mobile computing environment to the user.

[1]  J. Tellado,et al.  A fourth-generation MIMO-OFDM broadband wireless system: design, performance, and field trial results , 2002, IEEE Commun. Mag..

[2]  Roy H. Campbell,et al.  A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2002, IEEE Wirel. Commun..

[3]  Upkar Varshney,et al.  Issues in Emerging 4G Wireless Networks , 2001, Computer.

[4]  M. Jamil,et al.  4G: The future mobile technology , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[5]  Barry Brown Studying the use of mobile technology , 2001 .

[6]  Dusit Niyato,et al.  Call admission control for QoS provisioning in 4G wireless networks: issues and approaches , 2005, IEEE Network.

[7]  Rosli Salleh,et al.  The Future of Mobile Wireless Communication Networks , 2009, 2009 International Conference on Communication Software and Networks.

[8]  Toni Janevski 5G Mobile Phone Concept , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[9]  Nobuo Nakajima,et al.  The future generations of mobile communications based on broadband access technologies , 2000, IEEE Commun. Mag..

[10]  S. K. Patel,et al.  5G technology of mobile communication: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[11]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[12]  Sumant Ku Mohapatra,et al.  COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS , 2015 .

[13]  Olumuyiwa Oludare Fagbohun Comparative studies on 3G,4G and 5G wireless technology , 2014 .

[14]  Toni Janevski,et al.  Design for 5G Mobile Network Architecture , 2011, Int. J. Commun. Networks Inf. Secur..

[15]  Wang Li,et al.  A study of some key technologies of 4G system , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[16]  Wolfgang Kellerer,et al.  A communication gateway for infrastructure-independent 4G wireless access , 2002 .

[17]  Xiqi Gao,et al.  Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.

[18]  W. W. Lu,et al.  Open wireless architecture - the core to 4G mobile communications , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[19]  Sapna Shukla,et al.  Comparative Study of 1G, 2G, 3G and 4G , 2013 .

[20]  Aboubaker Lasebae,et al.  Providing Security in 4G Systems: Unveiling the Challenges , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[21]  Tarlochan S. Sidhu,et al.  Opportunities and challenges of wireless communication technologies for smart grid applications , 2010, IEEE PES General Meeting.

[22]  Pratap Singh,et al.  Key Concepts and Network Architecture for 5 G Mobile Technology , 2012 .

[23]  Biswajit Nandy,et al.  Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[24]  Alan Kai-Hau Yeung,et al.  Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..

[25]  Anwar M. Mousa,et al.  Prospective of Fifth Generation Mobile Communications , 2012 .

[26]  L.M. Gavrilovska,et al.  Ad hoc networking towards 4G: challenges and QoS solutions , 2005, TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services.

[27]  Adam Wolisz,et al.  Providing application-level QoS in 3G/4G wireless systems: a comprehensive framework based on multirate CDMA , 2002, IEEE Wirel. Commun..

[28]  Ishan Shah Comparative Study of 4G Technology, Applications and Compatibility in Prevailing Networks , 2012 .

[29]  Nicolas Sklavos,et al.  LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.