LIGHTWEIGHT CRYPTOSYSTEMS IN IOT AND 5G TELECOMMUNICATION ENVIRONMENTS: CHALLENGES, ARCHITECTURES, AND SECURITY TRADE-OFFS
DOI:
https://doi.org/10.31891/2219-9365-2025-83-33Keywords:
Internet of Things (IoT), 5G networks, lightweight cryptography, symmetric ciphers, security protocols, attacksAbstract
This paper provides a comprehensive analysis of the security architecture in 5G networks, focusing on a multi-layered protection framework that ensures confidentiality, integrity, and authenticity across various communication interfaces. The study examines three primary security layers—Non-Access Stratum (NAS) security, Access Stratum (AS) security, and transport security—highlighting their specific roles in safeguarding signaling, radio channels, and interactions between network components, respectively. Key cryptographic algorithms standardized in 5G, including AES, ZUC, and SNOW 3G, are analyzed in terms of their encryption and integrity verification capabilities, computational efficiency, and suitability for various deployment scenarios such as mobile broadband, IoT, and ultra-reliable low-latency communications (URLLC).
A detailed examination of the hierarchical key management system reveals the cascading generation of cryptographic keys from a root key securely stored in the user’s USIM and the home network. This structure minimizes risks by isolating potential compromises within localized key subsets, thereby preserving overall system security. The paper also discusses transport-layer protocols such as IPsec, TLS, and DTLS, which protect inter-network communication channels between base stations, user plane functions, and core network elements.
Furthermore, the study addresses emerging challenges in 5G security, including the need for enhanced protection mechanisms against evolving threats, integration of quantum-resistant algorithms, and adaptation to virtualization and software-defined networking (SDN) paradigms. The findings offer valuable insights for researchers and industry practitioners aiming to optimize security solutions while maintaining performance and energy efficiency in next-generation mobile networks.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Юлій БОЙКО, Віктор МІШАН, Дмитро ЯВТУШЕНКО

This work is licensed under a Creative Commons Attribution 4.0 International License.