1. Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
- Author
-
Tieyan Li, Haiguang Wang, Mingjun Wang, Shufan Fei, Jialei Zhang, Zheng Yan, Xidian University, Network Security and Trust, Huawei Technologies, Department of Communications and Networking, Aalto-yliopisto, and Aalto University
- Subjects
Authentication ,Computer Networks and Communications ,Computer science ,business.industry ,Communications security ,Computer security ,computer.software_genre ,Receivers ,Password ,Secure communication ,End-to-end principle ,Hardware and Architecture ,Order (exchange) ,5G mobile communication ,Key (cryptography) ,Cryptography ,Security ,Wireless ,business ,computer ,Software ,Heterogeneous network ,5G ,Information Systems ,Device-to-device communication - Abstract
Publisher Copyright: IEEE Mobile and wireless communication continues its rapid development. Beyond 5G, heterogeneous networks (HetNets) will be merged with the integration of various networking technologies. Unique characteristics of such an integrated converged network cause new security challenges, such as difficulty of key agreement and theft of communication content, especially when crossing network domains happens. In order to ensure secure and reliable communications, end-to-end (E2E) communication security is highly expected, especially for cross-trust-domain communications in HetNets. Unfortunately, little existing research touches this issue and the literature lacks a deep-insight review on the current state-of-the-art. In this article, we summarize current E2E secure communication scenarios and basic techniques. We propose a number of requirements based on security threat analysis and employ them as a measure to evaluate existing works. Through review and analysis, we finally determine open issues to highlight future research directions.
- Published
- 2021