Qutaiba Ibrahim,
Mustafa Haitham Mohammed,
Ali Fathel Rasheed,
- Professor, Department of Computer Engineering, Mosul University, Mosul, Iraq
- Assistant Lecture, Department of Computer Engineering, Mosul University, Mosul, Iraq
- Assistant Lecture, Department of Computer Engineering, Mosul University, Mosul, Iraq
Abstract
Internet of things (IoT) is a technology capable of connecting vast number of devices of many types worldwide via the internet using unique IP addresses. The connected devices can communicate ubiquitously anywhere, anytime for any given user. Such globally distributed networks require a high level of connectivity among its components like smart sensors, workstations as well as networking devices. Thankfully, with the aid of the recently emerged 5G technology, which offers improved characteristics in terms of capacity, reliability and coverage, the demands that IoT imposes can finally be satisfied. However, preserving the cybersecurity of 5G enabled IoT while taking advantage of its capabilities is not a trivial task. In this study, we review some of the techniques applied for the realization of IoT in 5G networks. Also, we aim at presenting a critical view about some of the recent works regarding the cybersecurity aspect of 5G based IoT. The accessibility and availability features of IoT may also give rise to various threats which may jeopardize the security of the network. This imposes a vital need to provide secure connectivity in terms of confidentiality, integrity and privacy for 5G enabled IoT in order to take full advantage of its potential.
Keywords: IoT, 5G, layered architecture, security, connectivity
[This article belongs to International Journal of Mobile Computing Technology ]
Qutaiba Ibrahim, Mustafa Haitham Mohammed, Ali Fathel Rasheed. A Secured Architecture of Internet of Things (IoT) in the 5G Age. International Journal of Mobile Computing Technology. 2025; 03(01):33-43.
Qutaiba Ibrahim, Mustafa Haitham Mohammed, Ali Fathel Rasheed. A Secured Architecture of Internet of Things (IoT) in the 5G Age. International Journal of Mobile Computing Technology. 2025; 03(01):33-43. Available from: https://journals.stmjournals.com/ijmct/article=2025/view=201684
References
- Santos B, Feng B, van Do T. Towards a standardized identity federation for internet of things in 5g networks. In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). 2018 Oct 8; 2082–2088.
- Lu Y, Da Xu L. Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet Things J. 2018 Sep 12; 6(2): 2103–15.
- Kumar KP, Padma TN, Goud BP. Efficient Secure Authentication Protocol for 5G Enabled Internet of Things Network. Technology. 2020; 2020(25): 4G.
- Shin S, Kwon T. A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access. 2020 Apr 6; 8: 67555–71.
- Wijethilaka S, Liyanage M. Survey on network slicing for Internet of Things realization in 5G networks. IEEE Commun Surv Tutor. 2021 Mar 22; 23(2): 957–94.
- Sharma S, Satapathy S, Singh S, Sahu AK, Obaidat MS, Saxena S, Puthal D. Secure authentication protocol for 5G enabled IoT network. In 2018 IEEE 5th International Conference on Parallel, Distributed and Grid Computing (PDGC). 2018 Dec 20; 621–626.
- Arfaoui G, Bisson P, Blom R, Borgaonkar R, Englund H, Félix E, Klaedtke F, Nakarmi PK, Näslund M, O’Hanlon P, Papay J. A security architecture for 5G networks. IEEE Access. 2018 Apr 17; 6: 22466–79.
- Chettri L, Bera R. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things Journal. 2019 Oct 22; 7(1): 16–32.
- Rahimi H, Zibaeenejad A, Safavi AA. A novel IoT architecture based on 5G-IoT and next generation technologies. In 2018 IEEE 9th annual information technology, electronics and mobile communication conference (IEMCON). 2018 Nov 1; 81–88.
- Ni J, Lin X, Shen XS. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J Sel Areas Commun. 2018 Mar 12; 36(3): 644–57.
- Obaidat M, Khodiaeva M, Obeidat S, Salane D, Holst J. Security architecture framework for Internet of Things (IoT). In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). 2019 Oct 10; 0154–0157.
- Mrabet H, Belguith S, Alhomoud A, Jemai A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors. 2020 Jun 28; 20(13): 3625.
- Burhan M, Rehman RA, Khan B, Kim BS. IoT elements, layered architectures and security issues: A comprehensive survey. Sensors. 2018 Aug 24; 18(9): 2796.
- Xie L, Ding Y, Yang H, Wang X. Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs. IEEE Access. 2019 Apr 29; 7: 56656–66.
- Wijethilaka S, Liyanage M. Survey on network slicing for Internet of Things realization in 5G networks. IEEE Commun Surv Tutor. 2021 Mar 22; 23(2): 957–94.
- Yun M, Yuxin B. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In 2010 IEEE international conference on advances in energy engineering. 2010 Jun 19; 69–72.
- Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ. IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J. 2016 Oct 4; 4(1): 1–20.
- Darwish D. Improved layered architecture for Internet of Things. Int J Comput Acad Res. 2015 Aug; 4(4): 214–23.
- Sethi P, Sarangi SR. Internet of things: architectures, protocols, and applications. J Electr Comput Eng. 2017; 2017(1): 9324035.
- Kumar PR, Wan AT, Suhaili WS. Exploring data security and privacy issues in internet of things based on five-layer architecture. Int J Commun Netw Inf Secur. 2020 Apr 1; 12(1): 108–21.
- Wang C, Wang HM. Physical layer security in millimeter wave cellular networks. IEEE Trans Wirel Commun. 2016 May 3; 15(8): 5569–85.
- Lal S, Taleb T, Dutta A. NFV: Security threats and best practices. IEEE Commun Mag. 2017 May 15; 55(8): 211–7.
- Aljuhani A, Alharbi T. Virtualized network functions security attacks and vulnerabilities. In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). 2017 Jan 9; 1–4.
- Suraj MV, Singh NK, Tomar DS. Big data Analytics of cyber attacks: a review. In 2018 IEEE international conference on system, computation, automation and networking (ICSCA). 2018 Jul 6; 1–7.

International Journal of Mobile Computing Technology
Volume | 03 |
Issue | 01 |
Received | 28/01/2025 |
Accepted | 28/01/2025 |
Published | 14/02/2025 |
Publication Time | 17 Days |