1 Introduction
At this stage of technological progress, as 5G technology has become an integral part of our daily lives, its application is evident in various areas such as: communication between devices on the mobile network [81], data transmission [82], and network slicing [83].
This fifth generation, by offering a broader array of services compared to its predecessors, allows for a wider application in areas like the interconnection of open systems [84]. However, concerns arise regarding security and privacy [85], given the emerging vulnerabilities.
Despite these advancements, a comprehensive understanding of the state of the art concerning this technology's impact on cybersecurity is still lacking, which, if explored, could pave the way for future developments in this domain. Recent studies indicate that the 5G generation is designed to offer faster speeds, lower latency, and a more robust connection compared to previous communication technologies.
However, a heightened security threat is anticipated due to the wide range of vectors through which adversaries can launch attacks. Consequently, cybersecurity becomes crucial, as it is associated with the protection of confidential data and user personal information [78], key elements to counteract such threats.
On the other hand, the impacts of 5G technology on cybersecurity [76] are promising, considering that any traditional system involves restricting cyber access to confidential data and components, which is expected to benefit the user. It is suggested to conduct a holistic assessment to understand the attack surface of a 5G-based system, with the aim of comprehending the potential cyber risk for such infrastructure and developing appropriate mechanisms for protection against these threats [73].
Furthermore, it is necessary to delve into the different definitions addressed in the review and conduct a classification of the various forms of existing information [75], to gain a clearer and structured understanding of the cybersecurity landscape in the 5G environment. It is evident that 5G technology applications can enhance cybersecurity and provide an overall better service; however, there is not yet specific research that analyzes the impact of this technology on cybersecurity.
This paper aims to determine the state of the art of 5G technology and its impact on cybersecurity. The structure of the document is organized as follows: Section II presents the theoretical framework; Section III describes the review method used; Section IV highlights the results and derived discussions; and finally, Section V provides the conclusions and suggests directions for future research in this field.
2 Background and Related Work
2.1 Research Problems and Objectives
To adequately understand 5G technology, which is already widely used today, it's essential to review some fundamental concepts.
2.1.1 First Generation (1G)
Mobile systems have evolved significantly since the emergence of the first generation in the 1980s. Back then, there were no robust security mechanisms [36].
2.1.2 Second Generation (2G)
The second generation of mobile phone services, known as 2G, was introduced in 1991, succeeding 1G. Mobile devices equipped with this technology offered voice and messaging services. However, 2G posed a series of security challenges. Within the realm of 2G networks, cyber attackers often used spam tactics as a means to distribute unsolicited information to users. This strategy facilitated the spread of malicious code among mobile device users. Attackers were using malicious code for harmful purposes [53].
2.1.3 Third Generation (3G)
The security system in 3G considered all the vulnerabilities detected in 2G and proceeded to rectify them. The security architecture implemented in 3G communications was articulated into five components: network access security, network domain security, user domain security, application security, and visibility and configurability security. Some of these vulnerabilities were related to unauthorized acquisition of users' confidential information, illicit interventions, and identity spoofing attacks [84].
2.1.4 Fourth Generation (4G)
The 4G security architecture was developed based on experiences and lessons drawn from the 2G and 3G networks. 4G introduced a revamped set of cryptographic algorithms and a significantly different key structure compared to 2G and 3G. However, 4G also inherited certain security problems present in these earlier networks. With the adoption of 4G technology, mobile operators had the capability to offer novel services, including those at high speeds. It is important to note that cybercriminals demonstrated an organization and adaptability that surpassed expectations [85].
2.1.5 Fifth Generation (5G)
Currently, a vast amount of information is in multimedia formats, such as images and videos. Given the increasing demand for this data, multimedia exchange has positioned itself as one of the most sought-after Internet services. Concurrently, the emergence of fifth generation (5G) networks brings numerous benefits in terms of providing these multimedia sharing services.
It is imperative to note that, given the relevance of image exchange in the multimedia context [47], the 5G network demands the implementation of security mechanisms adapted to the new applications, network architectures, and air interface technologies [77].
2.1.6 Future of the Network (6G)
The 6G promises to incorporate various components, such as edge computing, cloud computing, and artificial intelligence. Among these elements, the communications infrastructure expects to have the largest market share, reaching figures of up to one billion US dollars [29].
2.2 Cybersecurity
Cybersecurity is recognized as an essential element in the implementation of 5G technology within the European Union (EU). It is projected that 5G networks will play a leading role in the Digital Single Market (DSM), significantly influencing areas such as energy, transportation, and health services.
Furthermore, with the emergence of 5G, we are heading towards an even more interconnected world. In this context, vulnerabilities detected in the 5G systems of a member state could impact the entire EU. Consequently, it is essential to promote collaboration and cooperation among nations to ensure a safe and coordinated implementation of 5G [50].
3 Review Method
To conduct the systematic review on the impact of 5G technology on cybersecurity, the principle proposed by Petersen [69] and Rimaki [70] was followed.
They suggest the formulation of research questions, the search in relevant sources to extract data, and answering these questions considering the identified limitations and conclusions.
For more details, refer to Figure 1. A keyword map was also used as suggested by Kitchenham [71], with the aim of showing the most predominant research trends and detecting the topics present within the analyzed field.
A word map facilitates visualization and a better understanding of the actual meaning of each concept developed on the topic, as explained by Linnenluecke [72].
3.1 Research Problems and Objectives
A general research question (RQG) is formulated, and additionally, several specific research questions (RQ) are proposed along with their respective objectives, as shown in Table 1 below.
Research Question | Objectives |
RQG: What is the state of the art in research regarding 5G Technology and its impact on Cybersecurity? | Determine the state of the art in research regarding 5G Technology and its impact on Cybersecurity. |
RQ1: In which industrial sectors or fields of study is 5G Technology having a significant impact? | Determine the industrial sectors or fields of study where 5G Technology is influential. |
RQ2: How are the publications on 5G Technology and its impact on Cybersecurity distributed among the different journal quartiles? | Identify the distribution of publications on 5G Technology and its impact on Cybersecurity among different journal quartiles. |
RQ3: Who are the most prolific or influential authors in the field of 5G Technology and its impact on Cybersecurity, and what are their co-authorship networks? | Determine authors who frequently co-author papers on 5G Technology and its impact on Cybersecurity. |
RQ4: Which countries lead in producing research on 5G Technology and its impact on Cybersecurity, and how are the bibliometric flows distributed among these countries? | Identify countries that often feature bibliometric flows in research on 5G Technology and its impact on Cybersecurity. |
RQ5: How can papers be grouped based on the thematic similarity of their titles in the field of 5G Technology and its impact on Cybersecurity, and which topics dominate each cluster? | Identify clusters of papers whose titles show similarity in research about 5G Technology and its impact on Cybersecurity. |
3.2 Information Sources and Search Strategies
The sources selected for this systematic review include IEEE Xplore, ARDI, Web of Science, EBSCOhost, Scopus, and ACM Digital Library. To conduct the information search related to both dependent and independent variables, synonyms were sought, considering how authors refer to them in their papers, as shown in Table 2.
Descriptor | Description |
5g technology/ 5g/ 5g network/ 5g mobile telephony/ fifth generation | Independent Variable |
cybersecurity / online safety / security/cyber | Dependent Variable |
To track research papers based on search descriptors, equations were initially used in the selected sources. Boolean logic was also applied, tailoring it to the specifics of each source, as shown in Table 3.
Source | Search equation |
Scopus | TITLE-ABS-KEY (("5g technology" OR 5g OR "5g network” OR “5g mobile telephony” OR “fifth generation”) AND (cybersecurity OR "online safety" OR security OR cyber)) |
Web of Science | (“5g technology” OR 5g OR “5g network” OR “5g mobile telephony” OR “fifth generation”) AND (cybersecurity OR “online safety" OR security OR cyber) (Title) OR (“5g technology” OR 5g OR “5g network” OR “5g mobile telephony” OR “fifth generation”) AND (cybersecurity OR “online safety" OR security OR cyber) (Abstract) |
IEEE Xplore | (("Document Title":5g OR "Document Title":“5g technology” OR "Document Title":“5g network” OR "Document Title":“5g mobile telephony” OR "Document Title":“fifth generation”) AND ("Document Title":cybersecurity OR "Document Title":“online safety" OR "Document Title":security OR "Document Title":cyber)) OR (("Abstract":5g OR "Abstract":“5g technology” OR "Abstract":“5g network” OR "Abstract":“5g mobile telephony” OR "Abstract":“fifth generation”) AND ("Abstract":cybersecurity OR "Abstract":“online safety" OR "Abstract":security OR "Abstract":cyber)) |
ARDI | ((Abstract:(\(“5g technology” OR 5g OR “5g network” OR “5g mobile telephony” OR “fifth generation”\) AND \(cybersecurity OR “online safety" OR “security” OR “cyber”\))) OR (TitleCombined:(\(“5g technology” OR 5g OR “5g network” OR “5g mobile telephony” OR “fifth generation”\) AND \(cybersecurity OR “online safety" OR “security” OR “cyber”\)))) |
EBSCO host | AND (“5g technology” OR 5g OR “5g network”) AND (cybersecurity OR “online safety" OR security) Title OR (“5g technology” OR 5g OR “5g network”) AND (cybersecurity OR “online safety" OR security) Abstract |
ACM Digital Library | [[[Title: "5g technology"] OR [Title: 5g] OR [Title: "5g network"] OR [Title: "5g mobile telephony"] OR [Title: "fifth generation"]] AND [[Title: cybersecurity] OR [Title: "online safety"] OR [Title: security] OR [Title: cyber]]] OR [[[Abstract: "5g technology"] OR [Abstract: 5g] OR [Abstract: "5g network"] OR [Abstract: "5g mobile telephony"] OR [Abstract: "fifth generation"]] AND [[Abstract: cybersecurity] OR [Abstract: "online safety"] OR [Abstract: security] OR [Abstract: cyber]]] |
3.3 Identified Studies
In this section, the number of results obtained per source for the research is presented, as shown in Figure 2.
3.4 Exclusion Criteria
After obtaining the papers, the next step is to select them for evaluation to determine if they are suitable for the research. For this purpose, four filters with eight exclusion criteria (EC) were used, detailed as follows:
EC1: The papers are more than 7 years old.
EC2: The papers are not written in English.
EC3: The papers have not been published in conferences or journals.
EC4: The papers are systematic reviews.
EC5: The titles and keywords of the papers are not descriptive or relevant.
EC6: Full text of the papers is not available.
EC7: The papers are not unique.
EC8: The paper is less than 10 pages long.
3.5 Study Selection
Next, the selection of studies is presented using the PRISMA diagram, as shown in Figure 3.
3.6 Quality Assessment
At this stage, the quality of the 68 selected papers was assessed after applying the exclusion criteria. To ensure the quality of the papers, 7 quality criteria (QA) were established for their evaluation, which are as follows:
QA1: Does the paper consider fundamental research?
QA2: Does the paper reference the instruments used for data collection?
QA3: Does the paper provide access to the full text of the research?
QA4: Does the paper present a clear and precise delimitation of the specific area it addresses in its research?
QA5: Does the paper provide a comprehensive explanation of the context in which the research was conducted?
QA6: Does the researcher have relevant academic training in the field of study of 5G Technology and Cybersecurity?
QA7: Does the researcher provide contact information or institutional affiliation for future inquiries?
The assessment of the QA questions is conducted using a rating scale that ranges from 1 to 3 (1- Not good, 2- Good, and 3- Very good). The minimum value for inclusion is 12 (60% of the maximum). 68 papers were chosen as they scored ≥ 12. Table 4 displays the results of the quality assessment.
Ref. | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | Score | Ref. | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 | QA7 | Score |
[1] | 2 | 3 | 3 | 3 | 2 | 3 | 1 | 17 | [35] | 3 | 0 | 3 | 3 | 3 | 3 | 2 | 17 |
[2] | 2 | 1 | 3 | 3 | 1 | 2 | 3 | 15 | [36] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[3] | 2 | 1 | 3 | 3 | 1 | 2 | 3 | 15 | [37] | 3 | 3 | 3 | 3 | 3 | 2 | 3 | 20 |
[4] | 3 | 1 | 3 | 3 | 1 | 2 | 3 | 16 | [38] | 0 | 3 | 3 | 3 | 3 | 3 | 3 | 18 |
[5] | 3 | 3 | 0 | 3 | 3 | 2 | 3 | 17 | [39] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[6] | 3 | 3 | 3 | 0 | 3 | 3 | 0 | 15 | [40] | 3 | 3 | 3 | 2 | 3 | 3 | 3 | 20 |
[7] | 3 | 3 | 3 | 3 | 3 | 0 | 3 | 18 | [41] | 3 | 0 | 3 | 3 | 3 | 3 | 3 | 18 |
[8] | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 20 | [42] | 3 | 3 | 3 | 3 | 0 | 3 | 3 | 18 |
[9] | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 20 | [43] | 2 | 3 | 3 | 3 | 3 | 0 | 3 | 17 |
[10] | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 20 | [44] | 3 | 1 | 3 | 3 | 3 | 3 | 3 | 19 |
[11] | 3 | 0 | 2 | 3 | 3 | 3 | 0 | 14 | [45] | 3 | 2 | 3 | 0 | 3 | 3 | 3 | 17 |
[12] | 3 | 3 | 0 | 3 | 3 | 3 | 3 | 18 | [46] | 3 | 0 | 3 | 3 | 3 | 3 | 3 | 18 |
[13] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [47] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[14] | 3 | 3 | 3 | 0 | 3 | 3 | 3 | 18 | [48] | 3 | 3 | 3 | 3 | 3 | 0 | 1 | 16 |
[15] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [49] | 3 | 3 | 1 | 3 | 3 | 3 | 3 | 19 |
[16] | 0 | 3 | 0 | 3 | 3 | 3 | 1 | 13 | [50] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[17] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [51] | 3 | 0 | 3 | 3 | 3 | 3 | 3 | 18 |
[18] | 3 | 3 | 3 | 1 | 3 | 3 | 3 | 19 | [52] | 3 | 3 | 3 | 0 | 3 | 3 | 3 | 18 |
[19] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [53] | 2 | 3 | 3 | 3 | 3 | 0 | 3 | 17 |
[20] | 3 | 0 | 3 | 3 | 3 | 3 | 3 | 18 | [54] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[21] | 3 | 3 | 3 | 3 | 3 | 3 | 0 | 18 | [55] | 3 | 3 | 2 | 3 | 3 | 3 | 3 | 20 |
[22] | 3 | 3 | 3 | 0 | 3 | 3 | 3 | 18 | [56] | 3 | 3 | 3 | 3 | 3 | 2 | 3 | 20 |
[23] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [57] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[24] | 0 | 3 | 3 | 3 | 1 | 3 | 3 | 16 | [58] | 3 | 3 | 3 | 0 | 3 | 1 | 3 | 16 |
[25] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [59] | 3 | 0 | 3 | 1 | 3 | 3 | 3 | 16 |
[26] | 3 | 3 | 3 | 3 | 3 | 3 | 0 | 18 | [60] | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 20 |
[27] | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 20 | [61] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[28] | 3 | 3 | 0 | 3 | 3 | 3 | 3 | 18 | [62] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[29] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [63] | 2 | 3 | 3 | 2 | 3 | 3 | 0 | 16 |
[30] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [64] | 3 | 0 | 3 | 3 | 0 | 3 | 3 | 15 |
[31] | 3 | 3 | 3 | 3 | 0 | 3 | 3 | 18 | [65] | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 20 |
[32] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [66] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
[33] | 1 | 3 | 3 | 3 | 2 | 3 | 3 | 18 | [67] | 2 | 3 | 3 | 0 | 3 | 3 | 3 | 17 |
[34] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 | [68] | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 21 |
3.7 Data Extraction Strategies
Now, the process began to extract the most relevant papers with the aim to precisely address the established research questions. The extracted information included: Reference number, paper title, URL, source, year, countries, ISSN, type of publication, name of the publication, authors, affiliations, quartile, H-Index, research methodology, number of citations, abstract, keywords, discussion, and conclusion. To categorize the papers, Mendeley Desktop tool was utilized, as shown in Figure 4.
3.8 Synthesis of Findings
The information extracted for the research questions (RQ) was tabulated and presented as quantitative data, which was used to conduct a statistical comparison between the different findings corresponding to each research question.
These data obtained facilitated the identification of certain research patterns that have manifested over the past seven years.
4 Results and Discussion
In this section, key findings derived from the systematic review of the analyzed papers are presented and discussed. We examine the most prominent application areas, the quality levels of the sources, the co-authorship networks of the most influential researchers, the geographical distribution of the research, and the clusters of papers with similarity in titles.
This section provides a comprehensive view of the results obtained, contributing to a deeper understanding of this field of study and its evolution in recent years.
4.1 General Description of the Studies
The general findings obtained in this review are presented below. Figure 5 illustrates the percentage of papers according to the types of publication. In this study, 68 papers were selected, setting the criteria to only include papers from journals and conferences. Figure 5 reveals that 97.1% are from journals, while only 2.9% are from conferences, out of the total types of papers considered.
In the research conducted by Farooqui, Arshad, and Khan [73], both types of papers—conferences and journals—were also considered, aligning with the criteria used in this paper. On the other hand, Raveendran and Tabet [74] also used 68 papers in their review.
Authors Lozano and Mateo [75] state that in their paper, they employed 62.42% from conferences, 30.96% from journals, and included books, which constituted 6.62% of the participation, thus differentiating their review in terms of the exclusion criteria of the type of paper used in the current research.
It is noted that, over the years, the authors of the reviews are considering approximately 70 papers for their research, in addition to prioritizing papers from journals and conferences in their exclusion criteria.
In the future, authors might consider papers from journals and conferences as primary information, given the preference for these types of publications in this research field, as reflected in the various reviews considered. Table 5 displays the number of papers by continent and year.
Years Continent |
2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
Asia | 1 | 1 | 4 | 1 | 11 | 16 |
Europe | 1 | 4 | 5 | 7 | 13 | 4 |
America | 0 | 0 | 1 | 1 | 6 | 1 |
Oceania | 0 | 0 | 0 | 0 | 2 | 1 |
Africa | 0 | 0 | 0 | 0 | 1 | |
Total | 2 | 5 | 10 | 9 | 33 | 22 |
The papers selected for this research cover the period from 2016 to 2022, with contributions from all continents. As shown, the year 2022 recorded the most contributions, while 2016 had the fewest contributions. In the study by Gamboa-Cruzado [89], a continuous increase in publications from 2016 to 2021 is observed, which coincides with the current research.
Figure 7 illustrates the number of papers contributed by each continent, classifying them into categories: good, average, and low. On the other hand, the previous figure reveals that the continents of Asia and Europe are classified as good, contributing more than 30 papers each, while Africa and Oceania are considered low, contributing fewer than 10 papers each.
In the study by Raveendran and Tabet [74], papers were considered over a broader time range, from 2000 to 2020, providing a more extended temporal window compared to the current paper. On the other hand, Lozano, and Mateo [75] align with the results presented in this paper in identifying Asia as the continent with the most publications, accounting for 39.65%, followed by Europe with 32.25%. In a study conducted by Zeb, Mahmood, Hassan, Piran, Guizani, and Gildlund [76], the chosen time range spanned from 2003 to 2021.
It can be concluded that, for potential future research on this topic, it would be prudent to prioritize the search for information on the Asian continent, given the trend observed in the results found, as well as in the research of other authors, suggests that this continent is the most productive in terms of contributions, followed by Europe.
Regarding temporality, it might be beneficial to broaden the range of years considered to gain a broader and possibly more representative view of the state of the art in the field of 5G technology and its impact on cybersecurity.
4.2 Answers to the Research Questions
Following are the conclusions and specific findings that address each of the research questions posed in the study.
Each research question is tackled individually, providing detailed analyses and answers based on the data gathered and assessed in the previous section. This part of the paper offers a clear structure for understanding how the results relate to the research objectives and provides valuable insights into the current state of the field in relation to the questions raised.
RQ1: In which industrial sectors or fields of study is 5G Technology having a significant impact?
The following presents Table 6, which illustrates the sectors where 5G technology finds greater application according to this review.
Sector | Reference |
Qty (%) |
Telecommunications | [7] [8] [14] [17] [33] [40] [48] [52] | 8 (11,7) |
Health | [6] [8] [9] [10] [12] [15] [17] [18] [28] [29] [30] [33] [36] [37] [47] [48] [50] [51] [52] [59] [60] [62] | 22 (32,3) |
Transport | [2] [3] [6] [7] [8] [13] [15] [16] [17] [22] [23] [28] [30] [35] [36] [38] [39] [40] [44] [48] [50] [51] [52] [53] [55] [58] | 26 (38,2) |
Logistics | [2] [7] [13] [25] [32] [46] [57] | 7 (10,2) |
Agriculture | [6] [13] [15] [17] [28] [30] [50] | 7 (10,2) |
Education | [48] [51] [59] | 3 (4,4) |
Physical | [1] [2] [4] [5] [6] [8] [9] [10] [12] [13] [14] [15] [17] [18] [19] [21] [22] [24] [27] [28] [29] [30] [33] [35] [37] [39] [42] [45] [48] [49] [51] [52] [53] [54] [55] [56] [59] [60] [65] [68] | 40 (58,8) |
Economy | [21] [59] | 2 (2,9) |
Programming | [4] [5] [9] [26] [35] [41] [60] | 7 (10,2) |
From the table, it is evident that the predominant areas of application for 5G technology in this study are physics at 58.8%, transport at 38.2%, and healthcare at 32.3%.
Raveendran and Tabet [74] identify main themes as categories in their research, leading them to formulate five master themes related to higher-order concerns, namely: electromagnetic pollution, cybersecurity issues, data center overload, proliferation of submarine cables, and electronic waste.
On the other hand, Zeb, Mahmood, Hassan, Piran, Guizani, and Gildlund [76] primarily focus on the information of the industrial digital twin for control and management processes in industrial applications. Still, they also touch upon cloud computing, machine learning, artificial intelligence, 5G industrial services, industrial twin placement strategies, green communication, and automated optical inspection.
Goudarzi, Ghayoor, Waseem, Fahad, and Traore [86] place importance on the realm of the Internet of Things in next-generation IoT-enabled smart grids, with a higher number of contributions derived from parts of their papers included in their review. Authors Sodhro, Awad, Beek, and Nikolakopoulos [87] examine network layer approaches and other technologies in their review, with the areas of network and security having the most contributions recorded.
Ferrag, Maglaras, Argyriou, Kosmanos, and Janicke [88] point out that the research area receiving the most contributions in the papers they selected is security and privacy. The diversity in the criteria mentioned by various authors when addressing 5G technology reflects the breadth and complexity of this emerging technology.
Based on the focus of the review, areas of physics and electromagnetism, as well as security, are particularly emphasized, indicating that these are significant areas of interest in the current 5G literature.
Physics and electromagnetism are fundamental to understanding and advancing 5G technology, as they lie at the core of how wireless signals are transmitted and received.
The implications of 5G technology in these fields are vast and could lead to new innovations or technical challenges that have not yet been fully explored. Future research in the field of 5G technology could greatly benefit from the findings and themes highlighted in the current review.
However, it is crucial for future researchers to also follow their own criteria and personal focus, and perhaps explore other relevant areas or topics that might not have been extensively covered in current studies. The advice to adhere to the author's criteria suggests that each researcher should also bring their unique perspective and focus to the field, which could lead to new ideas and advancements not yet considered.
This is especially relevant in a rapidly moving and evolving technological field like 5G, where innovation and continuous exploration are essential for advancing knowledge and the practical application of the technology.
RQ2: What is the distribution of publications on 5G Technology and its impact on Cybersecurity among the different quartiles of journals?
Figure 6 displays the quartile levels broken down by year. The Figure 8 presented below illustrates the relationship between the quartiles and the sources used in the review through a Sankey diagram. This type of diagram allows for a clear and effective visualization of how the different quartiles are distributed among the various reviewed sources, facilitating the understanding of the correlation between these two elements.
Through graphical flows, the Sankey diagram displays how the quartiles are associated with each source, providing an intuitive visual representation that can be greatly helpful in understanding the distribution and trend of the quartiles in relation to the sources consulted in the systematic review process.
The Figure underscores that papers in this research are categorized into quartile levels Q1, Q2, Q3, and Q4, with Q1 being the most prevalent. Moreover, it is observed that the year 2022 contributed the highest number of papers.
On the other hand, the correlation between quartiles and the sources from which the papers originated is illustrated, revealing that all papers categorized in the Q1 quartile come from all consulted sources, with the exception of EBSCOhost.
This analysis reflects not only the distribution of papers across different quartiles and their yearly evolution but also the relationship between the perceived quality of the papers, represented by the quartiles, and the sources from which they were drawn, providing an in-depth perspective on the provenance and quality of the papers reviewed in this research.
The authors Ogbodo, Abu-Mahfouz, and Kurien [77] also agree with the findings of this research, including the same quartiles in their paper, with the exception of Q2. This reflects a similarity in the distribution of the quality of papers across different studies, although with some differences regarding the Q2 quartile.
This might indicate variations in the selection or evaluation of papers among different studies. This overlap, with the mentioned exception, could suggest a trend or pattern in the distribution of papers based on their quality and provides a basis for comparing and contrasting results among different studies in the realm of 5G Technology and its impact on cybersecurity.
It is observed that the considered papers span all quartile levels, though there is a notable decrease in the Q2 category. This could be a point of consideration for future researchers looking to evaluate the quality of this type of research.
The variability in the quartile distribution, particularly the drop in Q2, may offer insights regarding the quality and relevance of existing studies in the realm of 5G Technology and its impact on cybersecurity.
Furthermore, this pattern could serve as a guide for future research, suggesting a more thorough review of evaluation criteria and paper selection, especially concerning Q2.
This could contribute to a broader and more accurate understanding of the existing literature, and possibly influence the direction and focus of future research efforts in this field.
RQ3: Who are the most prolific or influential authors in the field of 5G Technology and its impact on Cybersecurity, and what are their co-authorship networks?
With respect to co-occurrence, there are semantic distributional models based on count vectors that represent by means of a matrix the frequency of occurrence of words (authors, in this case) in a document. The similarity between two words vectors can be obtained through the angle they form, specifically by the cosine of the angle.
It is considered that the smaller the angle, and consequently the cosine of the angle, the greater the similarity between them. With the following equation, we obtain the cosine measure between the documents
Figure 9 illustrates the bibliometric network that highlights the frequency with which certain authors collaborate as co-authors in the studies considered in this review.
This visualization can provide a clear representation of the connections and collaborations among researchers within the study field of 5G Technology and its impact on cybersecurity. Through this network, it is possible to identify clusters of authors who frequently work together, which may indicate research groups or institutions that are actively contributing to this area.
Figure 9 displays the bibliometric network of co-authors in this review, highlighting four authors who show a recurring co-authorship frequency: Zhu Han, Latif U. Khan, Choong Seon Hong, and Ibrar Yacoob, who each contribute to three research papers respectively with other researchers.
This visualization can be significant in understanding existing collaborations and the network of professional relationships in the field of 5G Technology and its impact on cybersecurity. Identifying these recurring authors may point to individuals or research groups that have a notable influence or specialization in the area.
Lozano and Mateo [75] highlight two papers as the most cited in their research: "Performance evaluation of the IEEE 802.11p WAVE communication standard" and "Delay and broadcast reception rates of highway safety applications in vehicular ad hoc networks," both authored by Eichler.
These papers focus on the performance evaluation of vehicular communication standards and highway safety applications, respectively. On the other hand, Ly, and Yao [78] identify the publication "Deep learning in mobile and wireless networking: A survey" as the most recurring in their review, written by Zhang, Patras, and Haddadi.
This work encompasses a comprehensive review of deep learning applied to mobile and wireless networks, reflecting an interest in the intersection between machine learning technologies and communication networks.
Based on the obtained results, it is evident that there are various prominent authors in the findings, which vary depending on the focus of the review. This suggests that in future research related to this topic, it might be beneficial to define one or several key benchmarks that could guide or inform the study in question.
Identifying these benchmarks can not only provide a solid foundation for the analysis but could also help situate the work within the broader context of the existing literature in this field. RQ4: What are the leading countries in the production of research on 5G Technology and its impact on Cybersecurity, and how are the bibliometric flows distributed among these countries?
The bibliometric flow between two countries can be calculated using the co-authorship matrix
Then, the bibliometric flow from country i to country j is calculated by dividing the number of collaborations between these two countries
The result is a flow matrix that displays the relative collaboration flow among all country pairs. This metric allows for the identification of which countries collaborate more closely in scientific production and how that collaboration is distributed globally.
Figure 10 illustrates the bibliometric flow coming from different countries. This visualization provides a graphic representation of the contribution and participation of various countries in the literature related to the researched topic.
This information is essential to understand the geographical distribution of the research and can help identify the leading regions on the subject, as well as potential international collaborations. It can also offer insight into how regional policies or trends might influence the evolution and application of 5G technology and its impact on cybersecurity.
Figure 11 displays the list of countries with the highest bibliometric flows. The Figure above shows the bibliometric flow of countries, which allows us to appreciate the number of co-occurrences between them. This representation showcases international collaborations in the field of research.
Specifically, it details that the United Kingdom tops the list with six instances of international collaborations, positioning itself as the country with the highest frequency in this respect, followed by China and France.
This analysis highlights the global interconnection in research on 5G technology and its impact on cybersecurity and may suggest a trend towards international collaboration on these critical and emerging topics. Additionally, it provides insight into how different regions are contributing and collaborating to advance knowledge in this specific field.
Raveendran and Tabet [74] place the United States as the country that contributes most to their research, followed by India. Lozano and Mateo [75] indicate that the United States is the country with the most international collaborations in their research, differing from the results of this review, but still considering the UK and France as the top contributors.
Based on the pre-existing findings and those obtained in this study, it is observed that the UK and the US are the countries that most frequently contribute to other countries, closely followed by France and India.
Therefore, it is suggested to consider these countries as primary reference points in future research in the field of 5G Technology and its impact on cybersecurity.
These nations, it seems, maintain a prominent position in the development and international collaboration on these critical topics, which might be of relevance for researchers looking to understand global trends and establish fruitful collaborations in this rapidly advancing field.
RQ5: How can papers be grouped based on the thematic similarity of their titles in the field of 5G Technology and its impact on Cybersecurity, and which themes predominate in each cluster? Similarity Metrics: Cosine similarity is examined and used to find the similarity of the papers based on term vectors.
Cosine Similarity: Cosine similarity allows determining the angle between two vectors; they will be similar if they are quite close in terms of direction and magnitude.
Cosine similarity helps measure the cosine of the angles between two vectors. The value of cosine similarity lies in the range of -1 to 1. A value of 1 indicates that the vectors are perfectly similar, and a value of -1 indicates that the vectors are exactly opposite to each other. Two papers are similar if their cosine similarity values are close to 1.
Moreover, these similarity measures are always between pairs of papers. Cosine similarity can only be calculated for vectors of similar sizes. The formula for cosine similarity for two vectors A and B is as follows:
Here, A.B is the dot product between the two vectors, and
Here,
If one wants to use a term-document matrix, the dot product can be expressed as a summation:
Therefore, this is the matrix product of the term-document matrix with its own transpose. Clustering is a machine learning task, and the techniques used in clustering can also be applied to text.
Clustering is the task of grouping data points into the same cluster, where points within the same cluster are more similar to each other than to points in different clusters. These data points can be considered as either documents or, in some cases, words.
TF-IDF is a method that assigns higher weight to rarer words, setting each element of the term-document matrix equal to the value w of multiplying the term frequency (TF) by the inverse document frequency (IDF) of each token (Kamath, Liu, & Whitaker, 2019, p. 96):
Term frequency (TF) is the number of times a word appears in a document. The IDF helps to understand the importance of a word within a document.
By calculating the inverse fraction (scaled logarithmically) of the documents over the number of documents containing the term, and then taking the logarithm of that quotient, one can get a measure of how common or rare a word is across all documents. Currently, TF-IDF is the most popular weighting method, as over 80% of today's digital libraries use it.
Figure 12 illustrates four groupings of papers based on the similarity of their titles in this study. These groupings, or clusters, can help identify common themes or focuses in the existing literature on 5G Technology and its impact on cybersecurity.
By analyzing the similarity in titles, patterns or trends in the research can be uncovered, which in turn can provide valuable insight into the predominant focus areas in this field. This graphical representation aids in understanding how different works cluster together and can serve as a helpful guide to explore specific areas of interest.
The Figure groups the papers into four clusters based on the similarity of their titles. This grouping allows for the identification and categorization of works based on common themes or terminologies, thereby facilitating a clearer understanding of the main focus areas within the research on 5G Technology and its impact on cybersecurity.
Through these clusters, an organized and structured view of the existing literature can be obtained, which could be beneficial for identifying trends, comparing approaches, and discovering potential areas that still require deeper exploration.
In their review, Raveendran and Tabet [74] opted for a more detailed classification and categorized the literature into 11 thematic clusters, focusing on aspects such as direct impacts on the environment, unrecognized rebound effects, and direct impacts on humans.
This more granular categorization allowed for a deep and specific exploration of various aspects and consequences associated with 5G technology. In contrast, the organization into 4 clusters, as shown in Figure 11, might provide a more general view but less detailed insight into the prevailing themes in the literature on 5G Technology and cybersecurity.
Both approaches have their advantages and disadvantages, and the choice between them will depend on the specific goals of the review and the level of detail researchers wish to achieve in their analysis of the existing literature.
Indeed, the organization of papers into clusters is a strategy that allows for grouping information in a way that facilitates analysis and interpretation of data.
This clustering can be done based on various criteria, such as similarity in titles, themes, methodologies, authors, among others. The way one decides to organize the clusters will depend on the focus of the research and the objectives they wish to achieve.
Therefore, in future studies, it is recommended that authors clearly define the criteria they will use to group the papers into clusters, so that this organization allows them to gain a better understanding of the state of the art and key findings in the area of study they are exploring.
It is also crucial that the selected criteria for clustering align with the research questions posed, ensuring that the organization of the data effectively contributes to answering these questions and achieving the research objectives.
5 Conclusions and Future Research
This paper presents a meticulous bibliometric and systematic review on the deployment of 5G Technology in the field of Cybersecurity, adopting the methodology proposed by Petersen. For this purpose, renowned sources such as Scopus, Web of Science, ARDI, ACM Digital Library, IEEE Xplore, and EBSCOhost were selected.
Through the application of specific equations, 13,235 studies were identified, to which meticulously designed exclusion criteria were applied. Using the Prisma diagram, the selection of 68 papers published between 2016 and 2022 was outlined. Subsequently, the selected studies were evaluated and organized using the Mendeley software.
Regarding the findings of this investigation, it stands out that the areas of greatest focus in the application of 5G technology are health, transport, and physics. The paper titled "6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions" is notably highlighted for its significant contribution to research.
Geographically, the United Kingdom emerges as the country with the highest bibliometric flow in this area of study, underscoring its prominent position in research on the intersection of 5G Technology and Cybersecurity.
This review presents two limitations that could be addressed in future research. Firstly, it was confined to six information sources, which may have narrowed the breadth of the findings.
A more expansive exploration incorporating a wider variety of databases and information sources could provide a more holistic and representative view of the current state of knowledge at the intersection of 5G Technology and Cybersecurity.
Secondly, the considered time frame, from 2016 to 2022, while pertinent to capture the most recent developments, may have excluded pioneering or foundational research conducted before this period.
Extending the temporal scope to include studies published in earlier years could unravel a deeper and contextualized understanding of the evolution of 5G Technology and its impact on Cybersecurity, thus allowing for a richer appreciation of the trends, challenges, and opportunities that characterize this dynamic and rapidly evolving field.