Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective

46Citations
Citations of this article
110Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with low-latency and seamless connectivity. Hence, spectrum sharing systems have been considered as a major enabler for next-generation wireless networks in meeting QoE demands. Specifically, the 3rd generation partnership project (3GPP) has standardized coexistence of 4G LTE License Assisted Access (LAA) network with WiFi in the unlicensed 5 GHz bands, and the 5G New Radio Unlicensed (NR-U) with WiFi 6/6E in 6 GHz bands. While most current coexistence solutions and standards focus on performance improvement and QoE optimization, the emerging security challenges of such network environments have been ignored in the literature. The security framework of standalone networks (either 5G or WiFi) assumes the ownership of entire network resources from spectrum to core functions. Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise. However, coexistence network environments can lead to unprecedented security vulnerabilities and breaches as the standalone networks shall tolerate unknown and out-of-network accesses, specifically in the medium access. In this paper, for the first time in literature, we review some of the critical and emerging security vulnerabilities in the 5G/WiFi coexistence network environment which have not been observed previously in standalone networks. Specifically, independent medium access control (MAC) protocols and the resulting hidden node issues can result in exploitation such as service blocking, deployment of rogue base-stations, and eavesdropping attacks. We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. This study opens a new direction of research in the analysis and design of a security framework that can address the unique challenges of coexistence networks.

References Powered by Scopus

Applications of self-interference cancellation in 5G and beyond

691Citations
N/AReaders
Get full text

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

682Citations
N/AReaders
Get full text

Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks

565Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

34Citations
N/AReaders
Get full text

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

30Citations
N/AReaders
Get full text

Recent Development of Emerging Indoor Wireless Networks towards 6G

26Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Ramezanpour, K., Jagannath, J., & Jagannath, A. (2023, February 1). Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. Computer Networks. Elsevier B.V. https://doi.org/10.1016/j.comnet.2022.109515

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 18

72%

Lecturer / Post doc 4

16%

Professor / Associate Prof. 2

8%

Researcher 1

4%

Readers' Discipline

Tooltip

Computer Science 15

50%

Engineering 11

37%

Business, Management and Accounting 2

7%

Chemical Engineering 2

7%

Save time finding and organizing research with Mendeley

Sign up for free