TABLE 1.
Point of attack | 5G security threats and attacks type [102]–[105] | Affected Healthcare Application | ||
---|---|---|---|---|
Medical IoT (e.g., wearables, implantable devices, on-site equipment, home-based medical devices) | Remote Medical Procedures (e.g., telesurgery, teleconsultation, ambulance drone, telemedicine, in-ambulance treatment) | Medical Data Management (e.g., confidential health records, personally identifiable information) | ||
Internet/Other Operator | Security Policy Conflicts | x | x | |
Internet | Pharming | x | x | |
Trojan | x | x | ||
Virus | x | x | ||
5G Central Cloud | Hijacking Attack | x | x | |
Man-in-the-middle Attack | x | x | ||
Configuration Attack | x | x | ||
Saturation Attack | x | x | ||
Signaling Attack | x | x | ||
5G Central Cloud/5G Edge Cloud | Slice/Resource Theft | x | x | |
5G Central Cloud/5G Edge Cloud/5G RAN | Distributed Denial of Service (DDoS) Attack | x | x | x |
Denial of Service (DoS) Attack | x | x | x | |
Penetration Attack | x | x | x | |
5G RAN | Reset and IP Spoofing | x | x | |
Scanning Attack | x | x | ||
Semantic Information Attack | x | x | ||
Signaling Storms/Signal Jamming | x | x | ||
International Mobile Subscriber Identity (IMSI) Catching Attack | x | x | ||
Illegal Intercept | x | x | ||
Flash Traffic | x | x | ||
Fake Base Station Attack | x | x | ||
End user | User Identity Theft | x | ||
Security Key Theft | x | |||
Advanced Malware | x | |||
Firmware Hacks | x | |||
Device Tampering | x | |||
Spyware | x | |||
IoT Botnets | x | |||
Ransomware | x | |||
Battery Draining Attack | x | |||
Identification Attack | x | |||
Privacy Breach | x |