SECURITY VULNERABILITIES IN IOT SYSTEMS DURING THE TRANSITION TO 5G/6G NETWORKS: CHALLENGES AND TECHNOLOGICAL SOLUTIONS

Abstract

This bibliographic research explores the context of the Internet of Things (IoT) and its critical relationship with cybersecurity in the face of the evolution of mobile communication technologies towards 5G and 6G networks. The objective is to analyze how the implementation of IoT solutions, leveraging the ultra- low latency and connection density of 5G/6G, amplifies the security vulnerabilities inherent in these devices, such as compromised Root-of-Trust attacks and large-scale Distributed Denial of Service (DDoS) attacks. It is observed that, despite the potential for service innovation in critical services (e.g., telemedicine), secure adoption faces significant barriers, such as the need for investment in edge security infrastructure, the scarcity of specialized talents, and the management of ethical and data privacy issues in massively interconnected environments. This work seeks to identify the main competitive and resilience challenges provided by the IoT-5G/6G convergence and the critical challenges that technology leaders must overcome. The methodology employed is a bibliographic review, using scientific articles, market reports, and specialized literature to support the analysis of the current and future landscape. It is concluded that proactive end-to-end security is an indispensable vector for trust and competitiveness, requiring companies not only technological investment in solutions like Artificial Intelligence (AI) for anomaly detection and Blockchain for data immutability, but also a profound cultural and strategic shift focused on governance.

 

Author Biographies

Gabriel Victor Rodrigues Cardoso

Acadêmico cursando 4° período de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba. 

Jhennifer Santana Moura

Acadêmico cursando 4° período de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba. 

 

Diego Santos Almeida Pinto

Orientador: Professor do curso de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba.

References

AL-GARADI, M. A. et al. A survey of machine learning techniques for cyber security in IoT. IEEE Communications Surveys & Tutorials, Piscataway, NJ, v. 20, n. 3, p. 2577-2601, third quarter 2018.

ANDREWS, P. V.; CHERIAN, J.; MADY, M. F. A Survey on the Use of Blockchain in the Internet of Things (IoT) Security. International Journal of Computer Networks and Communications, New Delhi, v. 14, n. 4, p. 75-87, 2022.

BOUSSAHA, H. et al. 5G/6G Security Challenges and Solutions for IoT: A Survey. IEEE Access, Piscataway, NJ, v. 11, p. 11883-11910, 2023.

BRYNJOLFSSON, E.; MCAFEE, A. The second machine age: Work, progress, and prosperity in a time of brilliant technologies. New York: W. W. Norton & Company, 2014.

DAVENPORT, T. H.; RONANKI, R. Artificial intelligence for the real world. Harvard Business Review, Boston, MA, v. 96, n. 1, p. 108-116, 2018.

MERCADO COMUM DO SUL (MERCOSUL). Lei nº 13.709, de 14 de agosto de 2018. Lei Geral de Proteção de Dados (LGPD). Brasília, DF: Diário Oficial da União, 2018.

SHAFI, M. et al. 6G Vision: A New Era of Wireless Communication. Applied Sciences, Basel, v. 10, n. 12, p. 4390, 2020.

YIN, H. et al. Security and Privacy in 5G-Enabled Internet of Things: Challenges and Solutions. IEEE Network, 2020.

How to Cite

Victor Rodrigues Cardoso, G., Santana Moura, J., & Santos Almeida Pinto, D. (2025). SECURITY VULNERABILITIES IN IOT SYSTEMS DURING THE TRANSITION TO 5G/6G NETWORKS: CHALLENGES AND TECHNOLOGICAL SOLUTIONS. RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218, 6(10), e6106908. https://doi.org/10.47820/recima21.v6i10.6908