A Review Study on 4G Security
Keywords:
Data Security, Internet, Long Term Evolution, Networks, Security, Wireless NetworkAbstract
The introduction of the Long Term Evolution (LTE) technology in recent technologies has revolutionized Fourth Generation, 4G Network communication, allowing users to receive high-speed data up to 100 MHz. The problem of cyber-security has become a menace to consumers all around the globe. This article will go through the LTE security concept. The next generations of wireless networks, known as 4G, will completely replace 3rd generation networks. It will provide faster speeds and multimedia services that are entirely IP based. 4G refers to an integrated, worldwide network that will give customers with phone, data, and streaming multimedia services "Anytime, Anywhere." The smooth handoff, mobility management, security, and service across multiple integrated networks are all essential and demanding issues in 4G. Data security, hardware security, and user privacy and integrity are the most important security concerns for any wireless mobile device. Security flaws may be created by attackers or induced by incorrect device or network parameter settings. The paper explains the concept of security and why it is important to pay attention to it. This paper examines what 4G network technology is and some of the proposed solutions in order to fully understand the benefits and problems of successfully deploying 4G. The future aspects are this Network access security, which allows users to access the service in a safe and secure manner.
Downloads
References
S. K. Mohapatra, B. R. Swain, and P. Das, “Comprehensive Survey of Possible Security Issues on 4G Networks,” Int. J. Netw. Secur. Its Appl., 2015, doi: 10.5121/ijnsa.2015.7205.
A. N. Bikos and N. Sklavos, “LTE/SAE security issues on 4G wireless networks,” IEEE Security and Privacy. 2013, doi: 10.1109/MSP.2012.136.
R. M. Zaki and H. Bahjat Abdul wahab, “4G Network Security Algorithms: Overview,” Int. J. Interact. Mob. Technol., 2021, doi: 10.3991/ijim.v15i16.24175.
A. Singla, S. R. Hussain, O. Chowdhury, E. Bertino, and N. Li, “Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks,” Proc. Priv. Enhancing Technol., 2020, doi: 10.2478/popets-2020-0008.
A. Deshpande and D. S. Pawar, “Evolution of Wireless Technology,” Int. J. Comput. Sci. Mob. Comput. IJCSMC., 2020.
M. Meraj, I. Mir, and S. Kumar, “Evolution of Mobile Wireless Technology from 0G to 5G,” Int. J. Comput. Sci.
Inf. Technol. , 2015.
M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes,” Journal of Network and Computer Applications. 2018, doi: 10.1016/j.jnca.2017.10.017.
S. Farhan, M. Ali, M. Kamran, Q. Javaid, and S. Zhang, “A Survey on Security for Smartphone Device,” Int. J. Adv. Comput. Sci. Appl., 2016, doi: 10.14569/ijacsa.2016.070426.
M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, and H. Janicke, “Security for 4G and 5G Cellular Networks,” J. Netw. Comput. Appl., 2018.
S. R. Hussain, O. Chowdhury, S. Mehnaz, and E. Bertino, “LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE,” 2018, doi: 10.14722/ndss.2018.23313.
D. Candal-Ventureira, P. Fondo-Ferreiro, F. Gil-Castiñeira, and F. J. González-Castaño, “Quarantining malicious iot devices in intelligent sliced mobile networks,” Sensors (Switzerland), 2020, doi: 10.3390/s20185054.