Securing 5G Positioning via Zero Trust Architecture

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14509))

  • 360 Accesses

Abstract

5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning system in its part will also be the leading navigation system, once the 5G mobile network potentials are fully deployed and accessible everywhere and by every user and device. However, 5G technology needs firstly to be cyber secured, before its benefits and capabilities can be totally explored and reached. Almost the majority of cyber security experts agree that the 5G technology is vulnerable to various threats, i.e., the high risk that it brings regarding cyber hacking and data theft due to the absence of suitable access control and data encryption during the communication process between the user-end devices and the 5G mobile network. In order to securely benefit from the full potential and capabilities of 5G network, there is a huge demand to protect the 5G technologies through ensuring the trust factor regarding the access to the 5G mobile network, in order to achieve a secure 5G positioning system from start to end. This review paper introduces the background of 5G and how to secure the 5G positioning system by implementing zero-trust network access on top of the 5G mobile network combined with the network overlay virtualization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Oruma, S.O., Petrovic, S.: Security threats to 5G networks for social robots in public spaces: a survey. IEEE Access 11, 63205–63237 (2023)

    Article  Google Scholar 

  2. Boualouache, A., Engel, T.: A survey on machine learning-based misbehavior detection systems for 5G and beyond vehicular networks. IEEE Commun. Surv. Tutorials 25(2), 1128–1172 (2023)

    Article  Google Scholar 

  3. Banda, L., Mzyece, M., Mekuria, F.: 5G business models for mobile network operators - a survey. IEEE Access 10, 94851–94886 (2022)

    Article  Google Scholar 

  4. The impact of 5G on location technology: whats real and whats hype? https://www.pointr.tech/blog/5G-indoor-positioning

  5. 5G security - enabling a trustworthy 5G system. https://www.ericsson.com/en/reports-and-papers/white-papers/5G-security--enabling-a-trustworthy-5G-system

  6. NSA - CSI : Embracing a Zero Trust Security Model: https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF

  7. Sullivan, S., Brighente, A., Kumar, S., Conti, M.: 5G security challenges and solutions: a review by OSI layers. IEEE Access 9, 116294–116314 (2021)

    Article  Google Scholar 

  8. Tezergil, B., Onur, E.: Wireless backhaul in 5G and beyond: issues, challenges and opportunities. IEEE Commun. Surv. Tutorials 24(4), 2579–2632 (2022)

    Article  Google Scholar 

  9. Shahzadi, R., Ali, M., Khan, H.Z., Naeem, M.: UAV assisted 5G and beyond wireless networks: a survey. J. Netw. Comput. Appl. 189, 103114 (2021)

    Article  Google Scholar 

  10. Chettri, L., Bera, R.: A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things J. 7(1), 16–32 (2020)

    Article  Google Scholar 

  11. Sharma, S.K., Bogale, T.E., Le, L.B., Chatzinotas, S., Wang, X., Ottersten, B.E.: Dynamic spectrum sharing in 5G wireless networks with full-duplex technology: recent advances and research challenges. IEEE Commun. Surv. Tutorials 20(1), 674–707 (2018)

    Article  Google Scholar 

  12. Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutorials 18(3), 1617–1655 (2016)

    Article  Google Scholar 

  13. Bodi, B., Chiu, W.Y., Meng, W.: Towards blockchain-enabled intrusion detection for vehicular navigation map system. ISPEC 2022, 3–20 (2022)

    Google Scholar 

  14. Wu, Y., Khisti, A., **ao, C., Caire, G., Wong, K.K., Gao, X.: A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J. Sel. Areas Commun. 36(4), 679–695 (2018)

    Article  Google Scholar 

  15. Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z.A., Doss, R.: Zero trust architecture (ZTA): a comprehensive survey. IEEE Access 10, 57143–57179 (2022)

    Article  Google Scholar 

  16. Chen, B., et al.: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE Internet Things J. 8(13), 10248–10263 (2021)

    Article  Google Scholar 

  17. Ge, Y., Zhu, Q.: MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks. MILCOM 2022: 571–576

    Google Scholar 

  18. NIST Special Publication 800–207- Zero Trust Architecture https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf

  19. Bello, Y., Hussein, A.R., Ulema, M., Koilpillai, J.: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Trans. Netw. Serv. Manag. 19(2), 1876–1889 (2022)

    Article  Google Scholar 

  20. Hireche, O., Benzaïd, C., Taleb, T.: Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G. Comput. Netw. 203, 108668 (2022)

    Google Scholar 

  21. Li, Y., Liu, S., Yan, Z., Deng, R.H.: Secure 5G positioning with truth discovery, attack detection, and tracing. IEEE Internet Things J. 9(22), 22220–22229 (2022)

    Article  Google Scholar 

  22. Liu, S., Yan, Z.: Efficient privacy protection protocols for 5G-enabled positioning in industrial IoT. IEEE Internet Things J. 9(19), 18527–18538 (2022)

    Article  Google Scholar 

  23. Fan, S., Ni, W., Tian, H., Huang, Z., Zeng, R.: Carrier phase-based synchronization and high-accuracy positioning in 5G new radio cellular networks. IEEE Trans. Commun. 70(1), 564–577 (2022)

    Article  Google Scholar 

  24. Bai, L., Sun, C., Dempster, A.G., Zhao, H., Cheong, J.W., Feng, W.: GNSS-5G hybrid positioning based on multi-rate measurements fusion and proactive measurement uncertainty prediction. IEEE Trans. Instrum. Meas. 71, 1–15 (2022)

    Google Scholar 

  25. Li, W., Wang, Y., Meng, W., Li, J., Su, C.: BlockCSDN: towards blockchain-based collaborative intrusion detection in software defined networking. IEICE Trans. Inf. Syst. 105-D(2), 272–279 (2022)

    Google Scholar 

  26. Meng, W., Li, W., Zhou, J.: Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70, 60–71 (2021)

    Article  Google Scholar 

  27. Li, W., Meng, W., Liu, Z.G., Au, M.H.: Towards blockchain-based software-defined networking: security challenges and solutions. IEICE Trans. Inf. Syst. 103-D(2), 196–203 (2020)

    Google Scholar 

  28. Sahay, R., Meng, W., Jensen, C.D.: The application of software defined networking on securing computer networks: a survey. J. Netw. Comput. Appl. 131, 89–108 (2019)

    Article  Google Scholar 

  29. Meng, W., Choo, K.K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)

    Article  Google Scholar 

  30. Li, W., Meng, W., Kwok, L.F.: A survey on OpenFlow-based software defined networks: security challenges and countermeasures. J. Netw. Comput. Appl. 68, 126–139 (2016)

    Article  Google Scholar 

  31. Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014)

    Article  Google Scholar 

  32. Meng, W., Luo, X., Li, W., Li, Y.: Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice. In: Trustcom/BigDataSE/ISPA, pp. 1061–1068 (2016)

    Google Scholar 

  33. Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265–276 (2016)

    Article  MathSciNet  Google Scholar 

  34. Li, W., Meng, W., Kwok, L.F.: Horace Ho-Shing Ip: enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)

    Article  Google Scholar 

  35. Meng, W., Wang, Y., Li, W., Liu, Z., Li, J., Probst, C.W.: Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. In: ACISP, pp. 759–767 (2018)

    Google Scholar 

  36. Meng, W., Li, W., Kwok, L.F.: Towards effective trust-based packet filtering in collaborative network environments. IEEE Trans. Netw. Serv. Manag. 14(1), 233–245 (2017)

    Article  Google Scholar 

  37. Meng, W., Li, W., Jiang, L., Choo, K.-K.R., Su, C.: Practical bayesian poisoning attacks on challenge-based collaborative intrusion detection networks. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 493–511. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29959-0_24

    Chapter  Google Scholar 

  38. Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481–489 (2019)

    Article  Google Scholar 

  39. Li, W., Meng, W., Kwok, L.F., Ip, H.H.S.: Develo** advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Clust. Comput. 21(1), 299–310 (2018)

    Article  Google Scholar 

  40. Wang, Y., Meng, W., Li, W., Li, J., Liu, W.X., **ang, Y.: A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122, 26–35 (2018)

    Article  Google Scholar 

  41. Chiu, W.Y., Meng, W., Li, W., Fang, L.: FolketID: a decentralized blockchain-based NemID alternative against DDoS attacks. In: ProvSec, pp. 210–227 (2022)

    Google Scholar 

  42. Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63, 103020 (2021)

    Google Scholar 

  43. Li, W.W., Meng, W., Yeh, K.H., Cha, S.C.: Trusting computing as a service for blockchain applications. IEEE Internet Things J. 10(13), 11326–11342 (2023)

    Article  Google Scholar 

  44. Li, W., Meng, W., Kwok, L.F.: Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions. IEEE Commun. Surv. Tutorials 24(1), 280–305 (2022)

    Article  Google Scholar 

  45. Li, W., Meng, W.: BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G Era. IEEE Netw. 36(4), 120–125 (2022)

    Article  Google Scholar 

  46. Li, W., Meng, W., Yang, L.T.: Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling. In: TrustCom, pp. 122–129 (2021)

    Google Scholar 

  47. Meng, W., Li, W., Zhu, L.: Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. 67(4), 1377–1386 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhi Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Adam, R.Y., Meng, W. (2024). Securing 5G Positioning via Zero Trust Architecture. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation