{"id":"https://openalex.org/W4415489707","doi":"https://doi.org/10.3390/fi17110485","title":"Understanding Security Vulnerabilities in Private 5G Networks: Insights from a Literature Review","display_name":"Understanding Security Vulnerabilities in Private 5G Networks: Insights from a Literature Review","publication_year":2025,"publication_date":"2025-10-23","ids":{"openalex":"https://openalex.org/W4415489707","doi":"https://doi.org/10.3390/fi17110485"},"language":"en","primary_location":{"id":"doi:10.3390/fi17110485","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17110485","pdf_url":"https://www.mdpi.com/1999-5903/17/11/485/pdf?version=1761216606","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/11/485/pdf?version=1761216606","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120114064","display_name":"Jacinta Fue","orcid":null},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Jacinta Fue","raw_affiliation_strings":["Department of Computer and Information Sciences, School of Engineering, Computer, and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, School of Engineering, Computer, and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023063391","display_name":"Jairo Guti\u00e9rrez","orcid":"https://orcid.org/0000-0002-2103-8636"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Jairo A. Gutierrez","raw_affiliation_strings":["Department of Computer and Information Sciences, School of Engineering, Computer, and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, School of Engineering, Computer, and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074828533","display_name":"Yezid Donoso","orcid":"https://orcid.org/0000-0003-1659-1522"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Yezid Donoso","raw_affiliation_strings":["Department of Systems and Computing Engineering, Faculty of Engineering, Universidad de los Andes, Bogot\u00e1 111711, Colombia"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Computing Engineering, Faculty of Engineering, Universidad de los Andes, Bogot\u00e1 111711, Colombia","institution_ids":["https://openalex.org/I162096671"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023063391"],"corresponding_institution_ids":["https://openalex.org/I39854758"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37265915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"11","first_page":"485","last_page":"485"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6761999726295471},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4415999948978424},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4284000098705292},{"id":"https://openalex.org/keywords/cornerstone","display_name":"Cornerstone","score":0.39160001277923584},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.3804999887943268},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3449000120162964},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.328000009059906},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.32440000772476196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7163000106811523},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6761999726295471},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.613099992275238},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4643999934196472},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4415999948978424},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4284000098705292},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.39160001277923584},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3804999887943268},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3449000120162964},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.328000009059906},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.3197000026702881},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.30070000886917114},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.29429998993873596},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.2896000146865845},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.27250000834465027},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2702000141143799},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.2542000114917755},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/fi17110485","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17110485","pdf_url":"https://www.mdpi.com/1999-5903/17/11/485/pdf?version=1761216606","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1638587ed54043a3940365fec440948b","is_oa":true,"landing_page_url":"https://doaj.org/article/1638587ed54043a3940365fec440948b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 11, p 485 (2025)","raw_type":"article"},{"id":"pmh:oai:openrepository.aut.ac.nz:10292/20272","is_oa":true,"landing_page_url":"http://hdl.handle.net/10292/20272","pdf_url":null,"source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.3390/fi17110485","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17110485","pdf_url":"https://www.mdpi.com/1999-5903/17/11/485/pdf?version=1761216606","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415489707.pdf","grobid_xml":"https://content.openalex.org/works/W4415489707.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W2607790552","https://openalex.org/W2765463072","https://openalex.org/W2949750931","https://openalex.org/W3092701525","https://openalex.org/W3119223610","https://openalex.org/W3138969339","https://openalex.org/W3168566563","https://openalex.org/W3190276117","https://openalex.org/W3211467008","https://openalex.org/W3214046283","https://openalex.org/W3216173637","https://openalex.org/W3217664575","https://openalex.org/W4200350187","https://openalex.org/W4226226481","https://openalex.org/W4235461920","https://openalex.org/W4255867402","https://openalex.org/W4284881889","https://openalex.org/W4285236280","https://openalex.org/W4285272167","https://openalex.org/W4288906073","https://openalex.org/W4309775988","https://openalex.org/W4311906436","https://openalex.org/W4323520276","https://openalex.org/W4323645996","https://openalex.org/W4376849825","https://openalex.org/W4379619901","https://openalex.org/W4382885030","https://openalex.org/W4383199515","https://openalex.org/W4387972638","https://openalex.org/W4388119844","https://openalex.org/W4388821146","https://openalex.org/W4390508437","https://openalex.org/W4390703055","https://openalex.org/W4390817852","https://openalex.org/W4391017931","https://openalex.org/W4391735778","https://openalex.org/W4392410921","https://openalex.org/W4393933438","https://openalex.org/W4394629132","https://openalex.org/W4396604914","https://openalex.org/W4401751492"],"related_works":[],"abstract_inverted_index":{"Private":[0],"fifth":[1],"generation":[2],"(5G)":[3],"networks":[4],"have":[5],"emerged":[6],"as":[7,18],"a":[8,69,120],"cornerstone":[9],"for":[10,158,170],"ultra-reliable,":[11],"low-latency":[12],"connectivity":[13],"across":[14],"mission-critical":[15],"domains":[16],"such":[17],"industrial":[19],"automation,":[20],"healthcare,":[21],"and":[22,43,60,64,86,108,136,145,161,172,187],"smart":[23],"cities.":[24],"Compared":[25],"to":[26,84,91,100,110,142,176],"conventional":[27],"technologies":[28],"like":[29],"4G":[30],"or":[31],"Wi-Fi,":[32],"they":[33],"provide":[34],"clear":[35],"advantages,":[36],"including":[37],"enhanced":[38],"service":[39],"continuity,":[40],"higher":[41],"reliability,":[42],"customizable":[44],"security":[45,53,72,97,174],"controls.":[46],"However,":[47],"these":[48],"benefits":[49],"come":[50],"with":[51],"new":[52],"challenges,":[54],"particularly":[55],"regarding":[56],"the":[57,106,124,164,167,178],"confidentiality,":[58],"integrity,":[59],"availability":[61],"of":[62,71,128,180],"data":[63],"services.":[65],"This":[66],"article":[67],"presents":[68],"review":[70,79,165],"vulnerabilities":[73,141],"in":[74,105,184],"private":[75,129,181],"5G":[76,130,182],"networks.":[77],"The":[78,117],"pursues":[80],"four":[81],"objectives:":[82],"(i)":[83],"identify":[85],"categorize":[87],"key":[88],"vulnerabilities,":[89],"(ii)":[90],"analyze":[92],"threats":[93],"that":[94,113],"undermine":[95],"core":[96],"principles,":[98],"(iii)":[99],"evaluate":[101],"mitigation":[102,143],"strategies":[103],"proposed":[104],"literature,":[107],"(iv)":[109],"outline":[111],"gaps":[112],"demand":[114],"further":[115],"investigation.":[116],"findings":[118],"offer":[119],"structured":[121],"perspective":[122],"on":[123],"evolving":[125],"threat":[126],"landscape":[127],"networks,":[131],"highlighting":[132],"both":[133],"well-documented":[134],"risks":[135],"emerging":[137],"concerns.":[138],"By":[139],"mapping":[140],"approaches":[144],"identifying":[146],"areas":[147],"where":[148],"current":[149],"solutions":[150],"fall":[151],"short,":[152],"this":[153],"study":[154],"provides":[155],"critical":[156],"insights":[157],"researchers,":[159],"practitioners,":[160],"policymakers.":[162],"Ultimately,":[163],"underscores":[166],"urgent":[168],"need":[169],"robust":[171],"adaptive":[173],"frameworks":[175],"ensure":[177],"resilience":[179],"deployments":[183],"increasingly":[185],"complex":[186],"high-stakes":[188],"environments.":[189]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-24T00:00:00"}
