Rapid expansion in the digital transformation of communication segments is driven by the 5G mobile communication among diverse sectors, including finance, transport, health etc. Freeze of 3rd Generation Partnership Project (3GPP) Release 15 and the conclusion of the first phase of 5G until the end of 2018 are counted as an essential milestone as per business necessities, New Radio (NR), network framework, and network composition. The next inline, Release 17 and Release 18 are concerned with protocol, improvements in service and placement pragmatics [27], transforming to the Next Generation of mobile communications (6G). 3GPP Release 18 would impact earlier features after 5G expands and establishes around the world. Initial services associated with 5G are enhanced Mobile Broadband (eMBB) services [28] that also simultaneously exist with Long Term Evolution (LTE) for coverage requirements with Network Radio. Radios with Artificial Intelligence (AI) and the main network can create centralized intelligence to enhance diversified wireless networks utilization [29]. 5G would require reducing delay and improving consistency for services extending ahead of edge or private networks. 5G may also boost a tighter integration with diverse network sections containing edge framework and accelerate network coverage, allowing a simpler structure and management of new applications and services. 5G is anticipated to augment Network Radios and mm-Wave manipulating a broader spectrum of frequencies from sub-6 GHz to 300 GHz. An outline of Network Radio implementation schemes, involving innovative waveform, frame configurations and improved radio elements are described in [30]. 5G will overlay centralized cell-less coverage related to users and investigate beyond the use of virtual radio control, non-line-of-sight ecosystems of mm-Wave and optical technology in wireless networks.
3GPP Release 17 creates augmentations to Network Radios for unlicensed frequency band, massive Multiple Input Multiple Output (MIMO), and a low data rate communication in industry, mentioned as NR-Light [27]. The scenarios evolving with 5G emergence as depicted in Fig. 3 are 1) “enhanced Mobile Broad Band (eMBB)” that supplements 4G broadband competencies, attainment of 100 Mbps characteristic data rates and ultimate data rates well above 1 Gbps. 2) “massive Machine Type Communication (mMTC)” that signifies IoT utilization in emergent paradigm currently with 4G LTE, but at relatively highly dense levels. It also aims to handle enormous applications span in 4G LTE that surfaced several demanding Quality of Service (QoS) requirements [31]. Likewise, the generally familiar characteristics of 5G are the ability to serve up to 1 million / km² devices, 10 times enhanced compared to 4G. The types and quantity of all these devices is dependent on expansion in IT development; however, smart cities are a common case. 5G also contains a 100-times improvement in energy efficacy, resulting in appreciably extended life for battery-based devices, like environmental sensors or fitness bands and Radio Frequency Identification Device (RFID) tags [32]. 3) “Ultrareliable Reliable Low Latency” (URLLC) that transforms applications time framework in a way that was previously unachievable. It is also revolutionizing mobile networks through autonomous transport systems, industrial automation, innovative mobile telemedicine system, etc.
5G technological modern aims are associated with certain key requirements. 5G technology is being designed to have the potential for compliance with all use cases of modern communication scenarios. Therefore, 5G is gaining considerable momentum from multiple domains like governments, industry, academia and researcher [33]. Several solutions and implantation are emerging on the surface through literature, projects, informal ideas, etc. Prominent elements in this area, including mm-Wave utilization, efficient handover, bandwidth management, massive connectivity and ultra-low latencies, are discussed in subsequent paragraphs. Similarly, these reviewed primary elements of 5G technology are summarized in Table 3.
2.1 mm-Wave Utilization
Several implementations are suggested by various researchers regarding the utilization of mm-Wave for 5G. The primary challenge faced by mm-Wave in 5G is path loss. Various models of Close-In (CI) and Floating Intercept (FI) can be utilized for comparative analysis of 5G mm-wave path loss [34]. 5G can enable 100kmph transmission and beam tracking through a beam tracking algorithm-based RF front architecture [35]. Moreover, 5G provisions use of congestion control algorithm to handle massive application data through mm-Wave [36]. Unmanned Aerial Vehicles (UAV) mm-Wave communication challenge can be counter through 5G based MIMO system [37]. However, mm-Wave utilization surfaces several constraints such as coverage problems and hardware utilization. Hybrid beam forming unconventional antenna and is a potential solution to counter coverage problem in Base Station and User Equipment’s (UEs) [38]. Employment of advanced baseband algorithms in 5G architecture can improve software/hardware performance [39].
2.2 Efficient Handover
Efficient handover is a primary requirement in 5G network employment for selection and shift among stations. Various techniques and algorithms can be used for challenging 5G scenarios in handover. Handover control is dependent on thresholding limits at signal level received by mobile devices; therefore, efficient thresholding algorithms are employable for improved handover performance in Radio Access Technology (RAT) selection in 5G [40]. Similarly, Analytical Hierarchical Approach (AHP) [41] and analysis algorithms [42] for RAT selection outperform the traditional A2A4 RAT selection with improved efficiency, reduced latency and less packet loss. Likewise, [43] proposed two distinct energy-saving schemes called, Adaptive-Sleep (AS), sectorization Adaptive Hybrid (AH) partitioning schemes for localized mobile networks using smart antenna systems. In this solution, a spatial Poisson process-based generic base model reduces the system intricacy and enhances the adaptive antenna's beam angle adjustment flexibility, termed a Smart Antenna (SA).
2.3 Bandwidth Management
One of the key functional challenge in ultra-dense 5G communication is efficient interference centric bandwidth management [44]. 5G also has the capacity to utilize the Visible Light Communication framework for the handover process to avoid saturation issues of Radio Frequencies [45]. Non Orthogonal Multiple Access (NOMA) based approaches are considered suitable for addressing the increased receiver complexity due to successive interference cancellation requirements. Simulations show that cooperative NOMA substantially improves the diversity gain and data rates in Beyond 5G (B5G) networks [46]. Similarly, a pre-coded NOMA system outperforms the conventional NOMA through Peak to Average Power Ratio (PAPR) minimization [47].
2.4 Massive Connectivity
Massive connectivity is considered a hallmark characteristic of 5G technology. This area has created various unconventional approaches along with several challenges and opportunities. Edge User Allocation (EUA) is one the challenges faced by 5G [48]. Unconventional approaches like decentralized game theory are suitable for baseline architecture in EUA based massive connectivity handling issues [49]. Other linked areas of massive connectivity handling are efficient and robust routing mechanisms and beamforming schemes [50]. The evolving and extensively related research concept for efficient routing is the MEC-based routing algorithm in 5G for improved resource and access management. This strategy outperforms the Time Division Multiple Access (TDMA) as well.
2.5 Low Latencies
The outstanding impact of 5G has attracted several advanced and mission-critical scenarios into a common sphere. In a wholistic scenario, the integrated performance of URLLC and eMBB is critically dependent on attaining low latency communication [51]. 5G low latencies requirements are pursued in literature through various techniques such as Grant Free Access (GFA), caching\ edge computing, dynamic multiplexing, intelligent scheduling and Machine Learning (ML) [52]. Similarly, zero downtime edge computing techniques are emerging to address the ultra-low latency streaming challenges in 5G communication [53]. Likewise, edge caching is emerged as a potent solution to address the data requests of mobile users at a first end to efficiently minimize latencies and improve the QoS of mobile users [54, 55].
2.6 Link Reliability
It is evident that seamless adoption of 5G technology is extremely dependent on the maintenance of network-wide link reliability. The emerging approaches in this regard are data replication, finite block length, multi-connectivity, multicast, network coding and channel control [51]. Deep learning-based link adaptation is one of the latest techniques in this domain. [56] presents a novel mapping method to compress highly multi-dimensional 5G transmissions into low multi-dimensions with bearable information loss to improve link reliability. One of the challenging associated problems of link reliably in 5G is Radio Link Failure (RLF). [57] proposed employment of ML for RLF prediction through correlation of Support Vector Machine (SVM) and Long Short Term Memory (LSTM).
Table 3
5G Challenges, Solutions & Outcome
Ref. | Year | Area | Challenges | Solutions | Outcome |
[35] | 2020 | mm-Wave utilization | RF Front End Architecture design | Beam-tracking Algorithm | A beam Tracking Technique |
[36] | 2020 | Integration with 3GPP | Congestion Control Algorithm | Execution Estimation of E2E communication |
[39] | 2019 | Bidirectional channeled performance | Baseband Algorithm | Software & hardware Compatibility and better flexibility |
[50] | 2018 | Path Loss | Beam forming | High data rates & improved massive connectivity |
[38] | 2019 | Coverage Problem | Hybrid beam forming | Unconventional antenna solution for Base Station and UEs |
[37] | 2021 | UAV mm-Wave communication | UAV MIMO System | Delivers massive assistance in steadiness, robustness, and spectral efficiency |
[40] | 2019 | Efficient Handover | A new RAT without any thresholding is unfavorable to the system resources | A thresholding approach for RAT selection | Improves the performance of the system and reduces the handover |
[41] | 2018 | Selection criteria of RATs | AHP | The scheme outperforms the traditional A2A4 selection process of RAT |
[42] | 2020 | Bandwidth Management | Time distribution in channel selection | Analysis Algorithm | Higher efficiency, reduced latency and packet loss |
[45] | 2016 | Saturation issues of Radio Frequencies | Visible Light Communication framework | Improved handover process |
[46] | 2021 | Massive Connectivity | NOMA Complexity | Cooperative relaying scheme | The scheme shows higher diversity gain and improved data rate with cooperative NOMA system |
[47] | 2019 | PAPR minimization | Pre-coded NOMA system | Improved the performance of conventional NOMA |
[49] | 2021 | EUA | Decentralized game-theoretic approach | Suggestively outpaces several advanced and baseline methods |
[58] | 2021 | Resource and access management | MEC-based routing algorithm | Outperforms the TDMA based scheme |
[53] | 2020 | Low Latencies | Zero downtime | Edge computing technique | Ultra-low latency streaming in 5G |
[54, 55] | 2018 2014 | Data requests of mobile users | Edge caching | Minimized latencies and improved the QoS |
[56] | 2021 | Link Reliability | Link Adaptation | Deep Learning | Improve link reliability |
[57] | 2021 | RLF | ML | RLF prediction |
2.7 Security in Fifth Generation Communication
Wireless technology classifications are not primarily restricted to classic phone-based audio and video communication. In the same fashion, phreaking is not restricted to the theft of general data [59]. Currently, it is transformed into immense cybercrime nexuses with distinct monetary, political and personal objectives [60]. 5G paradigm has opened up widespread research challenges for developers [61]. Moreover, 5G network has substantial security challenges due to numerous connections between the devices [62]. Subsequently [63, 64], the researchers have unified content perceptibility and centrally control policy to improve security and fortify vital data related to applications, users, and network functionality. CIA3 is a widely adopted security analysis model for categorizing threats and corresponding solutions. CIA3 based threat landscape of modern 5G mobile communication is shown in Figure 4. In subsequent paragraphs, we cover 5G security related research landscape into CIA3 segments along with summary in Table 4.
2.7.1 Confidentiality in 5G
Confidentiality of user data is one of the primary security goals in the 5G security model. It is the attribute that can guard data communication from getting exposed to malicious elements and from passive security occurrences. In both the security schemes of 4G-LTE and 5G architectures, users must be restricted to authorized data only [65]. We categories confidentiality related threats in thirteen types, which includes, Man-in-the-Middle (MitM) Threat [66], parallel session Threat [67], replay Threat [68], eavesdropping Threat [69], collaborated Threat [70], distributed threat [71], tracing Threat [72], spoofing Threat [73], privacy Threat [74], adaptive chosen text Threat [75], impersonation Threat [76], stalking Threat [77], sniffing threat [78] and disclosure Threat [79]. In 5G compatible data applications (e.g., autonomous vehicles [80], real-time health monitoring [81], etc.), the standard data encryption algorithms are generally employed to ensure data confidentiality. In standard practice, one private key is used to perform encryption and decryption functions of 5G data through symmetric key algorithms. According to [82], high reliance on large-scale deployed sensors has significantly increased the security risk due to IoT integration with 5G. To guarantee the privacy of user’s data gathered by cloud and improved data streaming, both linear and nonlinear models are recommended to be addressed by implementing a private Unscented Kalman filter [82].
2.7.2 Integrity in 5G
Integrity is generally defined as the prevention of altering and forfeiture of information during communication from one point to another. Integrity-related threats can be segregated into five types: Message append threats[83], message alteration threats [84], Selective message hampering threat [85], tampering threat [86] and spam related threats [87]. Non-Access Stratum (NAS) and Access Stratum (AS) are used for 4G LTE integrity protection [88]. Non-Access Stratum (NAS) and Access Stratum (AS) are used for 4G LTE integrity protection [88]. However, the major distinction of 5G NR is integrity protection entailment at the user plane as well. This is noteworthy since integrity fortification of the application plane is not provisioned in 4G. It is one of the desired features of resource-constrained 5G enabled IoT devices.
2.7.3 Authentication in 5G
This category includes five types of threats:, smart card based threats [89], partial collision based threats [90], forgery based threats [91], dictionary based threats [92] and parameters reuse based threats [93]. With the focus on authentication mechanism, [94] have suggested an authenticated key formation system founded on signatures for 5G enabled IoTs. The suggested method is analogous to some of the other techniques and certified for security by resorting to Burrows-Abadi-Needham logic, conventional and unofficial security evaluation via automated validation of application tools and internet security protocol. [95] proposed the requirement of the necessary security factor in IoT for ensuring authentication and authorization. Moreover, integrity-protected signaling is used in the 5G authentication mechanism. This guarantees that no unauthorized entity can alter or access the data transported wirelessly [96].
2.7.4 Availability in 5G
This categorization contains Seven types of threats, which includes, Redirection threat [97], physical threat [98], Distributed Denial of Service (DDoS) [99], Denial of Service (DoS [100]), First In First Out (FIFO) threat [101], Free riding threat [102] and skimming threat [103]. 5G paradigm ensures that legitimate users are provided with uninhibited network availability, thereby it established reputation on service provider. It simultaneously estimates the reliability of the network infrastructure to counter active security incidents, e.g., Denial of Service (DoS) attack. Network performance is seriously affected by a DoS attack. [72] indicated that 95–99.99% network availability can be ensured through the primary specifications bench marks of 5G, including eMBB and ultra-reliable Machine Type-Communication (uMTC). 5G based Network architecture is expected to ensure availability at a high probability of effectiveness.
2.7.5 Access Control in 5G
It is pertinent to discuss that the existing 3GPP 4G security scheme cannot seamlessly meet requirements of the modern 5G ecosystem as they are based on the traditional trust model of operators and subscribers. Thus, modern novelties necessitate a centralized security policies architecture to empower users to access network resources and applications conveniently. This category includes phishing [104], cloning [105], birthday [106] and social engineering [107]. [108] suggested a security-centric policy management framework to assist centralized security policy implementation scheme in 5G. Moreover, Security-as-a-Service (SaaS) can be enabled by operators as a prospective service to a number of IoT customers. A centrally controlled policy for assessing susceptibilities and lightly secured areas is desirable for the concerns of privacy, reliance and secrecy in distributed 5G based IoT networks [109]. The traditional requirement of secure network environment can be substantially addressed through centralized access control. Therefore, implementation of wide-ranging End-to-End security strategies are dominating security requirements in 5G networks. Further, these strategies should include the network architecture at all levels like signaling, data, and application levels [110]. Comprehensive access control and check at all levels in the network are the foundation to instrument a flawless security scheme. 5G necessitates a state or the art implementation of security framework like Abnormal Behavior Analysis-Intrusion Detection System (ABA-IDS) [93].
Table 4
Focused areas & Solutions for 5G Security
Ref. | Year | Focused Areas | Solutions |
[65] | 2020 | Confidentiality | Restricted user access to authorized data only |
[80] [81] | 2021, 2018 | Standard data encryption algorithms |
[82] | 2018 | Private Unscented Kalman filter |
[88] | 2019 | Integrity | Integrity protection at the user plane. |
[95] | 2020 | Authentication | Definite Requirement of security factor |
[94] | 2020 | Key formation system |
[96] | 2018 | Integrity-protected signaling approach |
[111] | 2018 | Availability | Assurance of availability |
[110] | 2020 | Access Control | Centralized visibility End-to-End security strategies |
[108] | 2020 | Security centric policy management framework |
[81] | 2018 | ABA-IDS in IoT smart water system |