5G Network Security Risks and Countermeasures in Power Industry Applications
Author(s):Kamaldeep Kaur1, Sabhyata Uppal Soni2, Sarpreet Kaur3
Affiliation: 1Research Scholar, UIET, Panjab University, Chandigarh, India, 2,3Assistant Professor, UIET, Panjab University, Chandigarh, India
Page No: 49-54
Volume issue & Publishing Year: Volume 2 Issue 11, Nov-2025
Journal: International Journal of Advanced Engineering Application (IJAEA)
ISSN NO: 3048-6807
DOI: https://doi.org/10.5281/zenodo.17753727
Abstract:
Wireless communication systems have encountered security challenges since their inception. In the first-generation (1G) networks, mobile devices and wireless links were susceptible to illegal cloning and identity spoofing. Second-generation (2G) networks experienced a rise in message spamming, which facilitated large-scale attacks and the spread of misinformation and unwanted advertisements. Many of the security flaws in the fifth-generation (5G) networks originate from vulnerabilities inherited from LTE (Long-Term Evolution) systems, such as unauthorized data access, denial of service (DoS) attacks, data breaches, and audio surveillance. To address these issues, a variety of security enhancement methods have been proposed in recent years. This paper reviews several of these strategies, evaluating their effectiveness in mitigating threats based on defined assessment criteria.
Keywords: Security Analysis, 5G, LTS, Software defined networks
Reference:
- [1] J. Cao et al., “A Survey on Security Aspects for 3GPP 5G Networks,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 170–195, Firstquarter 2020.
- [2] S. Park, S. Kwon, Y. Park, D. Kim, and I. You, “Session Management for Security Systems in 5G Standalone Network,” IEEE Access, vol. 10, pp. 73421–73436, 2022.
- [3] P. Wright et al., “5G network slicing with QKD and quantum-safe security,” Journal of Optical Communications and Networking, vol. 13, no. 3, pp. 33–40.
- [4] Q. Tang, O. Ermis, C. D. Nguyen, A. D. Oliveira, and A. Hirtzig, “A Systematic Analysis of 5G Networks with a Focus on 5G Core Security,” IEEE Access, vol. 10, pp. 18298–18319, 2022.
- [5] K. Saleem et al., “Bio-Inspired Network Security for 5G-Enabled IoT Applications,” IEEE Access, vol. 8, pp. 229152–229160, 2020.
- [6] Y. Wu et al., “A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 679–695, Apr. 2018.
- [7] G. Arfaoui et al., “A Security Architecture for 5G Networks,” IEEE Access, vol. 6, pp. 22466–22479, 2018.
- [8] Z. Zou, T. Chen, J. Chen, Y. Hou, and R. Yang, “Research on Network Security Risk and Security Countermeasures of 5G Technology in Power System Application,” Proc. 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 102–105, 2021.
- [9] L. Zhijie, “Research on communication security of power system based on 5G Technology,” Proc. 2021 IEEE International Conference on Data Science and Computer Application (ICDSCA), pp. 866–871, 2021.
- [10] Y. Jiang, Y. Cong, and A. Hu, “Power 5G Hybrid Networking and Security Risk Analysis,” Frontiers in Energy Research, vol. 12, Feb. 2022.
- [11] B. Li et al., “Technical System and Top-Level Frame Design for Energy Internet-Oriented Integrated 5G Power Communication Network,” Proc. 2021 IEEE 5th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1434–1437, 2021.
- [12] Y. Zou et al., “Electric Load Profile of 5G Base Station in Distribution Systems Based on Data Flow Analysis,” IEEE Transactions on Smart Grid, vol. 13, no. 3, pp. 2452–2466, May 2022.
- [13] L. Guo, C. Ye, Y. Ding, and P. Wang, “Allocation of Centrally Switched Fault Current Limiters Enabled by 5G in Transmission System,” IEEE Transactions on Power Delivery, vol. 36, no. 5, pp. 3231–3241, Oct. 2021.
- [14] J. M. Hamamreh, Z. E. Ankarali, and H. Arslan, “CP-Less OFDM With Alignment Signals for Enhancing Spectral Efficiency, Reducing Latency, and Improving PHY Security of 5G Services,” IEEE Access, vol. 6, pp. 63649–63663, 2018.
- [15] Z. Ai, Y. Liu, F. Song, and H. Zhang, “A Smart Collaborative Charging Algorithm for Mobile Power Distribution in 5G Networks,” IEEE Access, vol. 6, pp. 28668–28679, 2018.
- [16] C. Zhang, J. Ge, J. Li, F. Gong, and H. Ding, “Complexity-Aware Relay Selection for 5G Large-Scale Secure Two-Way Relay Systems,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5461–5465, Jun. 2017.
- [17] I. H. Abdulqadder, D. Zou, I. T. Aziz, B. Yuan, and W. Dai, “Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 866–877, Apr.–Jun. 2021.
- [18] S. Ahmadzadeh, G. Parr, and W. Zhao, “A Review on Communication Aspects of Demand Response Management for Future 5G IoT-Based Smart Grids,” IEEE Access, vol. 9, pp. 77555–77571, 2021.
- [19] X. Ma, Y. Duan, and S. Zhu, “Optimal configuration for photovoltaic storage system capacity in 5G base station microgrids,” Global Energy Interconnection, vol. 10, no. 7, pp. 29731–29740, Oct. 2021.
- [20] Y. Zhang, J. Li, and Y. Tian, “Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice,” Journal of Network and Computer Applications, vol. 7, no. 31, pp. 12–19, Aug. 2018.
- [21] M. Humayun et al., “Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things,” IEEE Access, vol. 8, pp. 183665–183677, 2020.
- [22] X. Zhang, J. Fei, H. Jiang, and X. Huang, “Research on Power 5G Business Security Architecture and Protection Technologies,” Proc. 2021 6th International Conference on Power and Renewable Energy (ICPRE), pp. 913–917, 2021.
- [23] T. A. Zerihun, M. Garau, and B. E. Helvik, “Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid,” IEEE Access, vol. 8, pp. 112642–112658, 2020.
- [24] X. Ma, Q. Zhu, and Z. Wang, “Optimal configuration of 5G base station energy storage considering sleep mechanism,” Global Energy Interconnection, vol. 1, no. 9, pp. 611–619, Feb. 2022.
- [25] B. D. Deebak and F. Al-Turjman, “A robust and distributed architecture for 5G-enabled networks in the smart blockchain era,” Computer Communications, vol. 9, no. 4, pp. 469–473, Oct. 2021.
- [26] C. R. Kumar J., A. Almasarani, and M. A. Majid, “5G-Wireless Sensor Networks for Smart Grid—Accelerating technology’s progress and innovation in the Kingdom of Saudi Arabia,” Procedia Computer Science, vol. 5, no. 13, pp. 9887–9896, Mar. 2021
