Advances in authentication and security protocols for 5G networks: a comprehensive survey
Abstract 5G networks, the newest generation of wireless communication in an era of quick technical breakthroughs, promise unmatched speed, dependability, and connection. With this ground-breaking innovation, it is crucial to have strong authentication and security processes to preserve critical data...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2025-07-01
|
| Series: | Discover Applied Sciences |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s42452-025-07317-2 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Abstract 5G networks, the newest generation of wireless communication in an era of quick technical breakthroughs, promise unmatched speed, dependability, and connection. With this ground-breaking innovation, it is crucial to have strong authentication and security processes to preserve critical data and shield consumers from any dangers. We thoroughly analyze authentication and security mechanisms created expressly for 5G networks in this study. We examine this sophisticated networking paradigm’s numerous difficulties and weaknesses, emphasizing the requirement for rigorous security measures. We also look at encryption algorithms essential for preserving the availability, confidentiality, and integrity of data transferred across 5G networks. Additionally, we go through cutting-edge technologies and standards like network slicing, edge computing, and virtualization that solve the security issues unique to 5G networks. We examine how they could affect authentication and security processes, highlighting both the opportunities and difficulties they present. |
|---|---|
| ISSN: | 3004-9261 |