Cristin-resultat-ID: 2271309
Sist endret: 17. juni 2024, 20:06
NVI-rapporteringsår: 2024
Resultat
Vitenskapelig artikkel
2024

IoT cybersecurity in 5G and beyond: a systematic literature review

Bidragsytere:
  • Sandeep Pirbhulal
  • Sabarathinam Chockalingam
  • Ankur Shukla og
  • Habtamu Abie

Tidsskrift

International Journal of Information Security
ISSN 1615-5262
e-ISSN 1615-5270
NVI-nivå 2

Om resultatet

Vitenskapelig artikkel
Publiseringsår: 2024
Publisert online: 2024
Sider: 1 - 53

Importkilder

Scopus-ID: 2-s2.0-85194841959

Klassifisering

Vitenskapsdisipliner

Sikkerhet og sårbarhet

Emneord

Robusthet • Internet of Things • 5G Netverk • Cyber security

Beskrivelse Beskrivelse

Tittel

IoT cybersecurity in 5G and beyond: a systematic literature review

Sammendrag

The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature of remote monitoring for different applications such as transportation, healthcare, and energy. There are several advantages of 5G and beyond for IoT applications like high speed and low latency. However, they are prone to cybersecurity threats due to networks softwarization and virtualization, thus raising additional security challenges and complexities. In this paper, we conducted a systematic literature review (SLR) of cybersecurity for 5G and beyond-enabled IoT. By developing a taxonomy to classify and characterize existing research, we identified and analyzed strategies, key patterns, mechanisms, performance evaluation, validation parameters and challenges of cybersecurity and resilience for 5G and beyond-enabled IoT in existing studies. We used “Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA)” recommendations for this SLR. Through our search in scientific databases, 4449 records published between 2017 and 2023 were initially identified, which were then reduced to 558 records after title and abstract screening to be considered for the eligibility check process. After screening the full-text, 79 articles were finalized for thorough analysis. The findings of this study suggest that 35% of the included studies focus on authentication and access control as security aspects, 59% studies are based on combination of both network layer and application layer as main operation layer, and 34% of the included studies use real-time implementation for validation purpose while the remaining studies utilize simulation or theoretical analysis. Our SLR also highlights open research challenges of 5G and beyond-enabled IoT cybersecurity and suggests a tentative solution for each challenge, which can be a focus of future research. Finally, key limitations of our SLR and threats to validity are addressed.

Bidragsytere

Sandeep Pirbhulal

  • Tilknyttet:
    Forfatter
    ved Avdeling for anvendt IKT-forskning DART ved Norsk Regnesentral

Sabarathinam Chockalingam

  • Tilknyttet:
    Forfatter
    ved Risiko og sikring ved Institutt for energiteknikk

Ankur Shukla

  • Tilknyttet:
    Forfatter
    ved Risiko og sikring ved Institutt for energiteknikk

Habtamu Abie

  • Tilknyttet:
    Forfatter
    ved Avdeling for anvendt IKT-forskning DART ved Norsk Regnesentral
1 - 4 av 4