Skip to main content
. Author manuscript; available in PMC: 2022 Feb 23.
Published in final edited form as: IEEE Access. 2021 Jan 5;9:1044–1061. doi: 10.1109/access.2020.3046927

TABLE 1.

Cybersecurity threats to the 5G ecosystem with the corresponding affected healthcare applications.

Point of attack 5G security threats and attacks type [102]–[105] Affected Healthcare Application
Medical IoT (e.g., wearables, implantable devices, on-site equipment, home-based medical devices) Remote Medical Procedures (e.g., telesurgery, teleconsultation, ambulance drone, telemedicine, in-ambulance treatment) Medical Data Management (e.g., confidential health records, personally identifiable information)
Internet/Other Operator Security Policy Conflicts x x
Internet Pharming x x
Trojan x x
Virus x x
5G Central Cloud Hijacking Attack x x
Man-in-the-middle Attack x x
Configuration Attack x x
Saturation Attack x x
Signaling Attack x x
5G Central Cloud/5G Edge Cloud Slice/Resource Theft x x
5G Central Cloud/5G Edge Cloud/5G RAN Distributed Denial of Service (DDoS) Attack x x x
Denial of Service (DoS) Attack x x x
Penetration Attack x x x
5G RAN Reset and IP Spoofing x x
Scanning Attack x x
Semantic Information Attack x x
Signaling Storms/Signal Jamming x x
International Mobile Subscriber Identity (IMSI) Catching Attack x x
Illegal Intercept x x
Flash Traffic x x
Fake Base Station Attack x x
End user User Identity Theft x
Security Key Theft x
Advanced Malware x
Firmware Hacks x
Device Tampering x
Spyware x
IoT Botnets x
Ransomware x
Battery Draining Attack x
Identification Attack x
Privacy Breach x