Securing 5G Positioning via Zero Trust Architecture

Razy Youhana Adam, Weizhi Meng*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


5G is the future, regardless of what mobile network technology succeeds it, whatever comes will be built upon the 5G technology. The 5G positioning system in its part will also be the leading navigation system, once the 5G mobile network potentials are fully deployed and accessible everywhere and by every user and device. However, 5G technology needs firstly to be cyber secured, before its benefits and capabilities can be totally explored and reached. Almost the majority of cyber security experts agree that the 5G technology is vulnerable to various threats, i.e., the high risk that it brings regarding cyber hacking and data theft due to the absence of suitable access control and data encryption during the communication process between the user-end devices and the 5G mobile network. In order to securely benefit from the full potential and capabilities of 5G network, there is a huge demand to protect the 5G technologies through ensuring the trust factor regarding the access to the 5G mobile network, in order to achieve a secure 5G positioning system from start to end. This review paper introduces the background of 5G and how to secure the 5G positioning system by implementing zero-trust network access on top of the 5G mobile network combined with the network overlay virtualization.
Original languageEnglish
Title of host publicationProceedings of the First International Conference on Artificial Intelligence Security and Privacy
Publication date2024
Publication statusPublished - 2024
EventFirst International Conference on Artificial Intelligence Security and Privacy - Guangzhou, China
Duration: 3 Dec 20245 Dec 2024
Conference number: 1


ConferenceFirst International Conference on Artificial Intelligence Security and Privacy


  • 5G Positioning
  • Cyber Security
  • Overlay Network
  • Trust Management
  • Zero Trust


Dive into the research topics of 'Securing 5G Positioning via Zero Trust Architecture'. Together they form a unique fingerprint.

Cite this