SECURITY VULNERABILITIES IN IOT SYSTEMS DURING THE TRANSITION TO 5G/6G NETWORKS: CHALLENGES AND TECHNOLOGICAL SOLUTIONS

Authors

  • Gabriel Victor Rodrigues Cardoso
  • Jhennifer Santana Moura
  • Diego Santos Almeida Pinto

DOI:

https://doi.org/10.47820/recima21.v6i10.6908

Keywords:

Internet of Things (IoT). Cybersecurity. 5G/6G Networks. Vulnerabilities. Ethical Governance.

Abstract

This bibliographic research explores the context of the Internet of Things (IoT) and its critical relationship with cybersecurity in the face of the evolution of mobile communication technologies towards 5G and 6G networks. The objective is to analyze how the implementation of IoT solutions, leveraging the ultra- low latency and connection density of 5G/6G, amplifies the security vulnerabilities inherent in these devices, such as compromised Root-of-Trust attacks and large-scale Distributed Denial of Service (DDoS) attacks. It is observed that, despite the potential for service innovation in critical services (e.g., telemedicine), secure adoption faces significant barriers, such as the need for investment in edge security infrastructure, the scarcity of specialized talents, and the management of ethical and data privacy issues in massively interconnected environments. This work seeks to identify the main competitive and resilience challenges provided by the IoT-5G/6G convergence and the critical challenges that technology leaders must overcome. The methodology employed is a bibliographic review, using scientific articles, market reports, and specialized literature to support the analysis of the current and future landscape. It is concluded that proactive end-to-end security is an indispensable vector for trust and competitiveness, requiring companies not only technological investment in solutions like Artificial Intelligence (AI) for anomaly detection and Blockchain for data immutability, but also a profound cultural and strategic shift focused on governance.

 

Downloads

Download data is not yet available.

Author Biographies

  • Gabriel Victor Rodrigues Cardoso

    Acadêmico cursando 4° período de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba. 

  • Jhennifer Santana Moura

    Acadêmico cursando 4° período de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba. 

     

  • Diego Santos Almeida Pinto

    Orientador: Professor do curso de Gestão da Tecnologia da Informação no Centro Universitário de Goiatuba.

References

AL-GARADI, M. A. et al. A survey of machine learning techniques for cyber security in IoT. IEEE Communications Surveys & Tutorials, Piscataway, NJ, v. 20, n. 3, p. 2577-2601, third quarter 2018.

ANDREWS, P. V.; CHERIAN, J.; MADY, M. F. A Survey on the Use of Blockchain in the Internet of Things (IoT) Security. International Journal of Computer Networks and Communications, New Delhi, v. 14, n. 4, p. 75-87, 2022.

BOUSSAHA, H. et al. 5G/6G Security Challenges and Solutions for IoT: A Survey. IEEE Access, Piscataway, NJ, v. 11, p. 11883-11910, 2023.

BRYNJOLFSSON, E.; MCAFEE, A. The second machine age: Work, progress, and prosperity in a time of brilliant technologies. New York: W. W. Norton & Company, 2014.

DAVENPORT, T. H.; RONANKI, R. Artificial intelligence for the real world. Harvard Business Review, Boston, MA, v. 96, n. 1, p. 108-116, 2018.

MERCADO COMUM DO SUL (MERCOSUL). Lei nº 13.709, de 14 de agosto de 2018. Lei Geral de Proteção de Dados (LGPD). Brasília, DF: Diário Oficial da União, 2018.

SHAFI, M. et al. 6G Vision: A New Era of Wireless Communication. Applied Sciences, Basel, v. 10, n. 12, p. 4390, 2020.

YIN, H. et al. Security and Privacy in 5G-Enabled Internet of Things: Challenges and Solutions. IEEE Network, 2020.

Published

24/10/2025

How to Cite

SECURITY VULNERABILITIES IN IOT SYSTEMS DURING THE TRANSITION TO 5G/6G NETWORKS: CHALLENGES AND TECHNOLOGICAL SOLUTIONS. (2025). RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218, 6(10), e6106908. https://doi.org/10.47820/recima21.v6i10.6908