1 Department of Management Studies, Lagos State University, PMB 0001, LASU Post Office, Lagos State, Nigeria.
2 College of Engineering (MS Telecommunication Networks), Northeastern University, Boston, MA, USA.
3 Department of Business and Economics (MS Business Analytics and Information Technology), University of Nairobi, Nairobi, Kenya.
World Journal of Advanced Research and Reviews, 2024, 22(03), 2358-2377
Article DOI: 10.30574/wjarr.2024.22.3.1730
Received on 26 April 2024; revised on 24 June 2024; accepted on 26 June 2024
The introduction of fifth-generation (5G) wireless networks in the United States can be used as a revolution in technology. Nevertheless, this development brings up important cybersecurity externalities with respect to Internet of Things (IoT) systems and cloud computing interoperability. This study was a systematic study of the cybersecurity threats in U.S. 5G deployments that concentrated on vulnerabilities in the IoT networks and cloud infrastructure. The mixed-method approach was used that included the quantitative analysis of network vulnerability data and the evaluation of threat landscapes qualitatively. The sources of the data collection were various databases of cybersecurity compromises by the government, reports by industries, and academic sources published between 2020-2024. Statistical calculations showed that 5G network was found to have 47.3 percent more vulnerability rates than 4G infrastructure. The number of network slicing vulnerabilities (34.6) and IoT device exploitation (41.2) had the largest share of threats and security incidents, respectively. The 24.2% of reported vulnerabilities were cloud integration challenges. The regression analysis (R2 = 0.683, p = 0.001) showed the presence of significant correlation between the level of cybersecurity incidents and the density of 5G deployment. The analysis single out four domains of critical vulnerability as network architecture, IoT device security, cloud connection vulnerability, and supply chain risks. The results of the research showed that the development of multi-tenant 5G settings posed more difficult isolation problems, and cross-slice attacks have risen by 56.8 percent after extensive implementation. Findings highlighted the need to have improved encryption policies, zero-trust systems, and all-inclusive security models. Some of the recommendations were the use of AI-based systems of threat detection, better security of the supply chain, and the creation of uniform security guidelines. The study adds to the knowledge of externalities of cybersecurity in 5G ecosystems and offers practical recommendations to policymakers, industry experts, and cybersecurity experts.
5G Networks; Cybersecurity Threats; Internet Of Things; Cloud Computing Integration; Network Slicing Vulnerabilities; Iot Security; Cyber Attacks; Wireless Security; Edge Computing; Zero-Trust Framework
Preview Article PDF
Akibu Abiodun Oni, Raymond Tay and Brian Otieno Odhiambo. Externalities of Cybersecurity Threats in United States 5G Deployments: Impacts on Internet of Things (IoT) Ecosystems and Cloud Computing Integration. World Journal of Advanced Research and Reviews, 2024, 22(03), 2358-2377. Article DOI: https://doi.org/10.30574/wjarr.2024.22.3.1730.