5G and AI: Addressing Security Challenges in Next-Generation Wireless Networks Through Machine Learning and Cryptographic Solutions
DOI:
https://doi.org/10.21015/vtcs.v13i1.2074Abstract
Modern wireless communication technologies are progressing very fast making it possible to deploy fifth-generation (5G) networks that have high speed with low delay and great connectivity. However, these innovative technologies also bring significant security risks as these are based on distributed environments, network slicing, and software-defined networking. Considering these threats, this research aims to examine the application of artificial intelligence and cryptographic approaches towards mitigating these risks. The use of AI in security has been highlighted to one of the best security features of current computer and network systems, especially in the case of machine learning. The Convolutional Neural Network (CNN) based detection models like GANs and Auto encoders show good detection rates but have issues of high computational load and energy consumption. Reinforcement learning models provide clients with adaptive solutions for security to change their approach as threats change. Moreover, five advanced solutions include post-quantum cryptography, homomorphic encryption, and blockchain-based authentication to enhance the security of the 5G network from unauthorized parties and data loss. These approaches are then assessed for their performance and effectiveness through experiment in enhancing aspects such as network security, performance, and efficiency in terms of energy use. However, adversarial AI attacks, block chain scalability, and the computational overhead associated with quantum-resistant encryption are still hurdles towards large-scale adoption. This paper revealed that there is the necessity to further refine the AI methods used, set standardization across the regulatory bodies, and employ highly secure cryptographic techniques for better protection of the 5G network. AI security frameworks, together with cryptographic improvements for the future generation wireless networks, can significantly improve security while maintaining efficiency and scalability, which will promote more secure future networks.
References
J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?,” *IEEE Journal on Selected Areas in Communications*, vol. 32, pp. 1065–1082, Jun. 2014.
F. Dahlman, E. Parkvall, and J. Sköld, *5G NR: The Next Generation Wireless Access Technology*. Academic Press, 2020.
X. Zhang, Y. Zhu, L. Wang, and H. Liu, “5G and IoT: Security challenges and opportunities,” *IEEE Internet of Things Journal*, vol. 6, pp. 7505–7515, Oct. 2019.
M. Ahmad, R. Kumar, and S. Khan, “Security issues in 5G networks: Vulnerabilities, threats, and countermeasures,” *IEEE Communications Surveys & Tutorials*, vol. 24, no. 1, pp. 1–22, 2022.
A. Kumar, J. Lin, and C. Wang, “Cyber threats in 5G networks and mitigation strategies,” *IEEE Transactions on Information Forensics and Security*, vol. 17, pp. 2300–2312, 2022.
M. Shafi, “5G: A tutorial overview of standards, challenges, and security risks,” *IEEE Transactions on Communications*, vol. 68, pp. 1307–1324, Mar. 2020.
Y. Li, X. Dai, and H. Wang, “A review on network slicing security in 5G,” *IEEE Access*, vol. 9, pp. 49250–49265, 2021.
I. J. Goodfellow, P. McDaniel, and N. Papernot, “Adversarial machine learning: Threats and solutions,” *IEEE Security & Privacy*, vol. 16, no. 4, pp. 30–39, 2018.
I. A. Awan, I. A. Sumra, K. Mahmood, M. Akram, S. K. Mujahid, and M. I. Zaman, “A reliable approach for data security framework in cloud computing network,” *Migration Letters*, vol. 21, no. S11, pp. 923–934, 2024.
A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cybersecurity intrusion detection,” *IEEE Communications Surveys & Tutorials*, vol. 18, no. 2, pp. 1153–1176, 2016.
G. Tang, S. Kang, and J. Liu, “Deep learning-based intrusion detection for wireless networks,” *Wireless Networks*, vol. 26, no. 5, pp. 3603–3617, 2020.
H. Nguyen, T. Pathirana, and J. Ding, “Reinforcement learning approaches for cybersecurity in 5G networks,” *Future Generation Computer Systems*, vol. 124, pp. 210–225, 2021.
M. K. Ijaz, K. Shomenov, D. Otegen, E. Shehab, and M. H. Ali, “Design and development of a 3D printed water-driven spinal posture corrector,” *The International Journal of Advanced Manufacturing Technology*, vol. 124, no. 5, pp. 1457–1471, 2023.
H. Alharbi, A. Alsabahi, and M. Gharakheili, “Advanced cryptographic solutions for 5G network security,” *Journal of Cryptographic Engineering*, vol. 12, no. 3, pp. 275–289, 2022.
A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” *IEEE Internet of Things Journal*, vol. 4, no. 6, pp. 2346–2358, 2017.
X. Chen, B. Li, and R. Zhao, “AI-driven security solutions for 5G: A hybrid approach,” *IEEE Trans. Netw. Serv. Manag.*, vol. 28, no. 1, pp. 55–70, 2021.
L. Chiaraviglio, S. Amoroso, M. A. Imran, and A. Zappone, “Standardization and regulation in 5G networks: Current status and future directions,” *IEEE Commun. Stand. Mag.*, vol. 5, no. 2, pp. 75–83, 2021.
S. Hussain et al., “Security vulnerabilities, challenges, and future research directions in 5G networks: A comprehensive survey,” *IEEE Access*, vol. 9, pp. 29680–29720, 2021.
L. Cheng et al., “Security and privacy in 5G integrated industrial IoT: A comprehensive survey,” *IEEE Trans. Ind. Informat.*, vol. 17, no. 11, pp. 7808–7826, 2021.
J. Méndez, M. Conti, and S. D. Pietro, “IoT botnet detection approaches for 5G networks: A survey,” *Comput. Netw.*, vol. 207, p. 108805, 2022.
R. Rebhi, A. Bouabdallah, and H. Bettahar, “Security analysis and challenges of 5G network slicing,” *J. Netw. Comput. Appl.*, vol. 188, p. 103112, 2021.
Y. Zhang et al., “Mitigating signaling storms in 5G networks: Challenges and solutions,” *IEEE Commun. Surv. Tutor.*, vol. 24, no. 1, pp. 450–472, 2022.
A. Raza et al., “Numerical study of evaporation modeling for different fuels at high operating conditions in a diesel engine,” *Eng. Proc.*, vol. 12, no. 1, p. 8, 2021.
H. Yang et al., “Man-in-the-middle attack detection in 5G networks: Challenges and solutions,” *IEEE Trans. Wireless Commun.*, vol. 21, no. 5, pp. 3990–4003, 2022.
M. Sharma, N. Gupta, and H. Tiwari, “Security issues and countermeasures for 5G-enabled autonomous systems,” *Comput. Commun.*, vol. 200, pp. 10–25, 2023.
X. Jia, W. Huang, and H. Zhou, “Side-channel attacks in 5G edge computing: Vulnerabilities and defenses,” *IEEE Trans. Inf. Forensics Secur.*, vol. 16, pp. 2300–2312, 2021.
R. Zhang, J. Lin, and W. Feng, “AI-driven anomaly detection in IoT-enabled 5G networks,” *J. Wireless Commun.*, vol. 47, no. 2, pp. 356–371, 2023.
J. Wang, X. Lin, and K. Zeng, “AI-driven security analytics in 5G networks: A survey,” *IEEE Internet Things J.*, vol. 9, no. 5, pp. 3802–3818, 2021.
B. Kim, D. Park, and C. H. Kim, “Deep learning-based malware detection for 5G-enabled IoT environments,” *IEEE Internet Things J.*, vol. 9, no. 6, pp. 5200–5211, 2022.
N. Gupta, A. Kumar, and R. Singh, “Reinforcement learning approaches for cybersecurity in 5G networks,” *IEEE Trans. Artif. Intell.*, vol. 4, no. 1, pp. 88–101, 2023.
H. Nguyen, T. Pathirana, and S. Ding, “Federated learning in 5G: A privacy-preserving approach for network security,” *Future Gener. Comput. Syst.*, vol. 134, pp. 90–105, 2023.
R. Ahmad et al., “Enhancing database security through AI-based intrusion detection system,” *J. Comput. Biomed. Inform.*, vol. 7, no. 02, 2024.
Y. Abdullah, M. A. Rahman, and T. Hashimoto, “Lightweight encryption techniques for securing 5G communications,” *IEEE Trans. Commun.*, vol. 70, no. 5, pp. 3282–3296, 2022.
X. Chen, B. Li, and R. Zhao, “Post-quantum cryptography in 5G networks: An overview,” *IEEE Commun. Stand. Mag.*, vol. 7, no. 2, pp. 40–47, 2023.
L. Huang, S. Tang, and J. He, “Quantum-resistant cryptographic solutions for future wireless networks,” *J. Cryptographic Eng.*, vol. 12, no. 1, pp. 51–68, 2022.
D. Liu, C. Zhang, and T. Wang, “Hybrid cryptographic frameworks for secure 5G communications,” *IEEE Trans. Inf. Secur.*, vol. 21, no. 1, pp. 187–202, 2023.
A. Singh, N. Kaur, and R. Pandey, “Decentralized security frameworks for 5G networks using blockchain,” *IEEE Trans. Inf. Forensics Secur.*, vol. 18, pp. 1601–1616, 2023.
A. Khan, Y. Zhou, and P. Li, “Smart contract-based authentication mechanisms for 5G networks,” *Future Internet*, vol. 15, no. 4, p. 99, 2023.
A. Rahman, S. Basu, and L. M. Khera, “Securing key exchange in 5G networks using blockchain technology,” *IEEE Trans. Blockchain*, vol. 5, pp. 220–234, 2023.
A. Yerubayeva, E. Shehab, K. I. Malik, and M. H. Ali, “Design and development of 3D printed Geneva wheel mechanism,” in *Proc. Int. Conf. Electr., Comput., Commun. Mechatronics Eng. (ICECCME)*, Nov. 2022, pp. 1–8.
Y. Xiong, J. Pan, and C. Wang, “Homomorphic encryption for secure data processing in 5G edge computing,” *IEEE Trans. Cloud Comput.*, vol. 12, no. 3, pp. 215–229, 2023.
W. Zhu, K. Liu, and H. Feng, “Secure multiparty computation in 5G networks: A cryptographic approach,” *IEEE Trans. Dependable Secure Comput.*, vol. 20, no. 4, pp. 912–925, 2023.
F. Feng, X. Yang, and C. Zhao, “Lightweight cryptographic solutions for resource-constrained 5G devices,” *IEEE Internet Things J.*, vol. 10, no. 2, pp. 1775–1788, 2023.
R. Mokhtar, A. H. Malik, and Z. K. Ahmad, “Optimizing AI-based security solutions in 5G networks for real-time threat mitigation,” *IEEE Trans. Artif. Intell.*, vol. 5, no. 2, pp. 150–162, 2023.
M. Hamza, B. Chang, and L. Zhao, “Hardware acceleration for AI-driven security mechanisms in 5G,” *IEEE Trans. Circuits Syst. I, Reg. Papers*, vol. 70, no. 8, pp. 3125–3139, 2023.
A. Ibrahim, H. Wang, and X. Guo, “Efficient cryptographic hardware for secure 5G communications,” *IEEE Trans. Very Large Scale Integr. (VLSI) Syst.*, vol. 31, no. 4, pp. 650–665, 2023.
S. Naseer, S. A. Qasim, R. A. Azim, and K. I. Malik, “Analyzing the shear heating effects in modeling the hydrodynamic lubrication of high torque low-speed diesel engine by considering different viscosity-grade lubricants,” in *Proc. ASME Int. Mech. Eng. Congr. Expo.*, vol. 52101, Nov. 2018, p. V007T09A033.
R. Chowdhury, M. Akhtar, and P. Kumar, “Regulatory and standardization challenges for AI and cryptographic security in 5G networks,” *IEEE Trans. Eng. Manag.*, vol. 70, no. 3, pp. 789–805, 2023.
H. Patel, S. Yang, and M. Carter, “Interoperability of AI-driven security frameworks for 5G network operators,” *IEEE Trans. Commun.*, vol. 71, no. 1, pp. 212–225, 2023.
M. Ahmed, F. Zaman, and R. Ali, “Policy-driven security frameworks for global 5G deployments,” *IEEE Trans. Netw. Serv. Manag.*, vol. 19, no. 3, pp. 598–612, 2023.
L. Tan, H. Wu, and M. Wang, “Ethical considerations in AI-based cybersecurity monitoring for 5G,” *J. Cyber Ethics Secur.*, vol. 6, no. 1, pp. 25–42, 2023.
X. Liu, Y. Ma, and H. Song, “Blockchain-based authentication for 5G networks: Challenges and opportunities,” *IEEE Trans. Netw. Serv. Manag.*, vol. 20, no. 1, pp. 57–72, 2023.
N. Rahman, S. Ali, and J. Khan, “Blockchain authentication in next-generation networks,” Blockchain Security Review, vol. 15, no. 3, pp. 225–242, 2022.
M. Abdalla, M. Benslimane, and T. Taleb, “Computational complexity in 5G security: A trade-off analysis,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 155–168, 2020.
X. Chen, Y. Li, and M. Zhao, “Deep learning-based intrusion detection in 5G networks: Challenges and future directions,” Neural Networks Journal, vol. 143, pp. 105–120, 2022.
J. Wu, Q. Zhang, and Y. Lin, “Lightweight AI models for security: Pruning, quantization, and neuromorphic computing,” Neural Computation Security Journal, vol. 5, no. 4, pp. 54–72, 2023.
W. Zhang, Y. Zhou, and J. Xu, “Deep learning-based intrusion detection for 5G networks,” IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 2891–2905, 2023.
Y. Gao, M. Patel, and X. Song, “Post-quantum cryptography and its impact on 5G security,” IEEE Communications Magazine, vol. 60, no. 9, pp. 45–52, 2022.
S. Nayak, P. Jha, and R. Kumar, “Evaluating hash-based cryptography for post-quantum security in 5G,” Cryptographic Advances Journal, vol. 38, no. 4, pp. 98–115, 2023.
F. Liu, L. Wang, and Z. Chen, “Standardization efforts in post-quantum cryptography: A global perspective,” Journal of Cryptographic Standards, vol. 11, no. 1, pp. 55–72, 2023.
R. Singh and S. Kapoor, “Smart contract-based authentication for 5G security,” Journal of Cybersecurity Innovations, vol. 27, no. 1, pp. 130–149, 2023.
M. Ali, R. Khan, and Y. Zhao, “Enhancing blockchain scalability using layer-2 solutions: A review of rollups and sidechains,” Journal of Blockchain Technology, vol. 8, no. 2, pp. 112–130, 2023.
D. Kumar, P. Mehta, and B. Roy, “Energy-efficient blockchain consensus mechanisms: A PoS and BFT approach,” Blockchain and Sustainable Computing, vol. 6, no. 3, pp. 87–102, 2023.
V. Mishra and K. Patel, “Privacy-preserving AI security: Differential privacy and homomorphic encryption techniques,” Cybersecurity Privacy Journal, vol. 9, no. 2, pp. 122–139, 2023.
Y. Wang, B. Xu, and D. Lee, “Edge AI for real-time cybersecurity: Deploying lightweight models at edge nodes,” Edge Computing and Security Journal, vol. 6, no. 1, pp. 112–128, 2023.
L. Almeida, C. Fernandez, and P. Russo, “Explainable AI for cybersecurity: Interpretability, trust, and regulatory compliance,” IEEE Transactions on AI Ethics, vol. 5, no. 1, pp. 45–63, 2023.
S. Chakraborty, A. Singh, and R. Verma, “AI security frameworks and compliance: GDPR, NIST, and global standards,” International Journal of Cybersecurity Policy, vol. 10, no. 3, pp. 150–170, 2023.
P. Sharma and K. Gupta, “Reinforcement learning for adaptive 5G security,” IEEE Transactions on Network Security, vol. 32, no. 2, pp. 55–70, 2023.
J. Almeida, F. Silva, and P. Brown, “Explainable AI for cybersecurity in 5G,” Journal of AI Ethics and Governance, vol. 18, no. 3, pp. 75–92, 2023.
T. Wu, H. Zhang, and B. Liu, “Model compression techniques for AI-based security in 5G networks,” IEEE Transactions on AI in Communications, vol. 12, no. 3, pp. 229–243, 2023.
A. Sharma and R. Gupta, “Zero trust security models for AI-driven threat mitigation,” Journal of AI and Security Strategies, vol. 9, no. 3, pp. 78–96, 2023.
Y. Gao, X. Li, and H. Zhang, “Optimizing post-quantum cryptography: Advances in lattice- and hash-based techniques,” Journal of Cryptographic Research, vol. 12, no. 4, pp. 212–235, 2022.
J. Nayak, S. Reddy, and T. Bose, “Hybrid post-quantum cryptographic approaches: Bridging classical and quantum security,” Quantum Computing and Security Review, vol. 4, no. 3, pp. 188–205, 2023.
T. Rahman, S. Alam, and N. Hoque, “Smart contract security vulnerabilities and mitigation techniques,” Journal of Blockchain Security Research, vol. 7, no. 2, pp. 145–162, 2023.
R. Hamza, J. Liu, and S. Patel, “Accelerating AI security processing with hardware optimizations: GPUs, FPGAs, and ASICs,” IEEE Transactions on Security Hardware, vol. 7, no. 2, pp. 98–115, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY