Learning Centre

Is 5G Handover Secure and Private? A Survey

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Zhao, Dongsheng
dc.contributor.author Yan, Zheng
dc.contributor.author Wang, Mingjun
dc.contributor.author Zhang, Peng
dc.contributor.author Song, Bin
dc.date.accessioned 2021-04-07T06:31:18Z
dc.date.available 2021-04-07T06:31:18Z
dc.date.issued 2021-08-15
dc.identifier.citation Zhao , D , Yan , Z , Wang , M , Zhang , P & Song , B 2021 , ' Is 5G Handover Secure and Private? A Survey ' , IEEE Internet of Things Journal , vol. 8 , no. 16 , 9385385 , pp. 12855-12879 . https://doi.org/10.1109/JIOT.2021.3068463 en
dc.identifier.issn 2327-4662
dc.identifier.other PURE UUID: 8fa2b5c8-3834-4409-9ed2-807022bf3d0e
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/8fa2b5c8-3834-4409-9ed2-807022bf3d0e
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=85103269956&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/61639404/bare_jrnl2.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/103527
dc.description.abstract The next-generation mobile cellular communication and networking system (5G) is highly flexible and heterogeneous. It integrates different types of networks, such as 4G legacy networks, Internet of Things (IoT), vehicular ad hoc network (VANET), and wireless local access network (WLAN) to form a heterogeneous network. This easily results in continual vertical handovers between different networks. On the other hand, substantial deployment of small/micro base stations (BSs) brings frequent horizontal handovers within a network. The continual handovers among BSs and various networks expose mobile equipment (ME) to the risk of security and privacy threats. So far, many security and privacy mechanisms have been proposed to ensure secure handover either vertically or horizontally in 5G networks. Nevertheless, there still lacks a thorough survey to summarize recent advances and explore open issues although handover security and privacy are crucial to 5G. In this article, we summarize security and privacy requirements in handovers to resist potential attacks. Following these requirements as the evaluation criteria, we review secure and privacy-preserving handover schemes by categorizing them into two scenarios, i.e., vertical handover and horizontal handover. As for the vertical handover, we review related work from three classes, i.e., handovers within Third-Generation Partnership Project (3GPP) networks, between 3GPP and non-3GPP networks, and between non-3GPP networks. Concerning horizontal handovers, we review related work from two classes, i.e., intramobile service controller (MSC) and inter-MSC handover. Meanwhile, we analyze and compare the technical means and performance of these works in order to uncover open issues and inspire future research directions. en
dc.format.extent 25
dc.format.mimetype application/pdf
dc.language.iso en en
dc.publisher IEEE
dc.relation.ispartofseries IEEE Internet of Things Journal en
dc.rights openAccess en
dc.title Is 5G Handover Secure and Private? A Survey en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department Xidian University
dc.contributor.department Network Security and Trust
dc.contributor.department Zalando SE
dc.contributor.department Department of Communications and Networking en
dc.subject.keyword 5G mobile communication
dc.subject.keyword 5G Networks
dc.subject.keyword Handover
dc.subject.keyword HetNets
dc.subject.keyword Internet of Things
dc.subject.keyword Privacy
dc.subject.keyword Privacy Preservation.
dc.subject.keyword Radio access technologies
dc.subject.keyword Security
dc.subject.keyword Wireless networks
dc.identifier.urn URN:NBN:fi:aalto-202104072796
dc.identifier.doi 10.1109/JIOT.2021.3068463
dc.type.version acceptedVersion


Files in this item

Files Size Format View

There are no open access files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive


Advanced Search

article-iconSubmit a publication

Browse

Statistics