Abstract
5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning system in its part will also be the leading navigation system, once the 5G mobile network potentials are fully deployed and accessible everywhere and by every user and device. However, 5G technology needs firstly to be cyber secured, before its benefits and capabilities can be totally explored and reached. Almost the majority of cyber security experts agree that the 5G technology is vulnerable to various threats, i.e., the high risk that it brings regarding cyber hacking and data theft due to the absence of suitable access control and data encryption during the communication process between the user-end devices and the 5G mobile network. In order to securely benefit from the full potential and capabilities of 5G network, there is a huge demand to protect the 5G technologies through ensuring the trust factor regarding the access to the 5G mobile network, in order to achieve a secure 5G positioning system from start to end. This review paper introduces the background of 5G and how to secure the 5G positioning system by implementing zero-trust network access on top of the 5G mobile network combined with the network overlay virtualization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Oruma, S.O., Petrovic, S.: Security threats to 5G networks for social robots in public spaces: a survey. IEEE Access 11, 63205–63237 (2023)
Boualouache, A., Engel, T.: A survey on machine learning-based misbehavior detection systems for 5G and beyond vehicular networks. IEEE Commun. Surv. Tutorials 25(2), 1128–1172 (2023)
Banda, L., Mzyece, M., Mekuria, F.: 5G business models for mobile network operators - a survey. IEEE Access 10, 94851–94886 (2022)
The impact of 5G on location technology: whats real and whats hype? https://www.pointr.tech/blog/5G-indoor-positioning
5G security - enabling a trustworthy 5G system. https://www.ericsson.com/en/reports-and-papers/white-papers/5G-security--enabling-a-trustworthy-5G-system
NSA - CSI : Embracing a Zero Trust Security Model: https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF
Sullivan, S., Brighente, A., Kumar, S., Conti, M.: 5G security challenges and solutions: a review by OSI layers. IEEE Access 9, 116294–116314 (2021)
Tezergil, B., Onur, E.: Wireless backhaul in 5G and beyond: issues, challenges and opportunities. IEEE Commun. Surv. Tutorials 24(4), 2579–2632 (2022)
Shahzadi, R., Ali, M., Khan, H.Z., Naeem, M.: UAV assisted 5G and beyond wireless networks: a survey. J. Netw. Comput. Appl. 189, 103114 (2021)
Chettri, L., Bera, R.: A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things J. 7(1), 16–32 (2020)
Sharma, S.K., Bogale, T.E., Le, L.B., Chatzinotas, S., Wang, X., Ottersten, B.E.: Dynamic spectrum sharing in 5G wireless networks with full-duplex technology: recent advances and research challenges. IEEE Commun. Surv. Tutorials 20(1), 674–707 (2018)
Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutorials 18(3), 1617–1655 (2016)
Bodi, B., Chiu, W.Y., Meng, W.: Towards blockchain-enabled intrusion detection for vehicular navigation map system. ISPEC 2022, 3–20 (2022)
Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K.K., Gao, X.: A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 36(4), 679–695 (2018)
Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z.A., Doss, R.: Zero trust architecture (ZTA): a comprehensive survey. IEEE Access 10, 57143–57179 (2022)
Chen, B., et al.: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE Internet Things J. 8(13), 10248–10263 (2021)
Ge, Y., Zhu, Q.: MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks. MILCOM 2022: 571–576
NIST Special Publication 800–207- Zero Trust Architecture https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
Bello, Y., Hussein, A.R., Ulema, M., Koilpillai, J.: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Trans. Netw. Serv. Manag. 19(2), 1876–1889 (2022)
Hireche, O., Benzaïd, C., Taleb, T.: Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput. Netw. 203, 108668 (2022)
Li, Y., Liu, S., Yan, Z., Deng, R.H.: Secure 5G positioning with truth discovery, attack detection, and tracing. IEEE Internet Things J. 9(22), 22220–22229 (2022)
Liu, S., Yan, Z.: Efficient privacy protection protocols for 5G-enabled positioning in industrial IoT. IEEE Internet Things J. 9(19), 18527–18538 (2022)
Fan, S., Ni, W., Tian, H., Huang, Z., Zeng, R.: Carrier phase-based synchronization and high-accuracy positioning in 5G new radio cellular networks. IEEE Trans. Commun. 70(1), 564–577 (2022)
Bai, L., Sun, C., Dempster, A.G., Zhao, H., Cheong, J.W., Feng, W.: GNSS-5G hybrid positioning based on multi-rate measurements fusion and proactive measurement uncertainty prediction. IEEE Trans. Instrum. Meas. 71, 1–15 (2022)
Li, W., Wang, Y., Meng, W., Li, J., Su, C.: BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking. IEICE Trans. Inf. Syst. 105-D(2), 272–279 (2022)
Meng, W., Li, W., Zhou, J.: Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70, 60–71 (2021)
Li, W., Meng, W., Liu, Z.G., Au, M.H.: Towards blockchain-based software-defined networking: security challenges and solutions. IEICE Trans. Inf. Syst. 103-D(2), 196–203 (2020)
Sahay, R., Meng, W., Jensen, C.D.: The application of software defined networking on securing computer networks: a survey. J. Netw. Comput. Appl. 131, 89–108 (2019)
Meng, W., Choo, K.K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)
Li, W., Meng, W., Kwok, L.F.: A survey on OpenFlow-based software defined networks: security challenges and countermeasures. J. Netw. Comput. Appl. 68, 126–139 (2016)
Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014)
Meng, W., Luo, X., Li, W., Li, Y.: Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice. In: Trustcom/BigDataSE/ISPA, pp. 1061–1068 (2016)
Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265–276 (2016)
Li, W., Meng, W., Kwok, L.F.: Horace Ho-Shing Ip: enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)
Meng, W., Wang, Y., Li, W., Liu, Z., Li, J., Probst, C.W.: Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. In: ACISP, pp. 759–767 (2018)
Meng, W., Li, W., Kwok, L.F.: Towards effective trust-based packet filtering in collaborative network environments. IEEE Trans. Netw. Serv. Manag. 14(1), 233–245 (2017)
Meng, W., Li, W., Jiang, L., Choo, K.-K.R., Su, C.: Practical bayesian poisoning attacks on challenge-based collaborative intrusion detection networks. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 493–511. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29959-0_24
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019)
Li, W., Meng, W., Kwok, L.F., Ip, H.H.S.: Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Clust. Comput. 21(1), 299–310 (2018)
Wang, Y., Meng, W., Li, W., Li, J., Liu, W.X., Xiang, Y.: A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122, 26–35 (2018)
Chiu, W.Y., Meng, W., Li, W., Fang, L.: FolketID: a decentralized blockchain-based NemID alternative against DDoS attacks. In: ProvSec, pp. 210–227 (2022)
Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63, 103020 (2021)
Li, W.W., Meng, W., Yeh, K.H., Cha, S.C.: Trusting computing as a service for blockchain applications. IEEE Internet Things J. 10(13), 11326–11342 (2023)
Li, W., Meng, W., Kwok, L.F.: Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions. IEEE Commun. Surv. Tutorials 24(1), 280–305 (2022)
Li, W., Meng, W.: BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G Era. IEEE Netw. 36(4), 120–125 (2022)
Li, W., Meng, W., Yang, L.T.: Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling. In: TrustCom, pp. 122–129 (2021)
Meng, W., Li, W., Zhu, L.: Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. 67(4), 1377–1386 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Adam, R.Y., Meng, W. (2024). Securing 5G Positioning via Zero Trust Architecture. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_39
Download citation
DOI: https://doi.org/10.1007/978-981-99-9785-5_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9784-8
Online ISBN: 978-981-99-9785-5
eBook Packages: Computer ScienceComputer Science (R0)