Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in April 2026 (Volume 30, Issue 1) Submit manuscript

Network Security in 5G - threats, vulnerabilities and mitigation strategies

Breadcrumb

  • Home
  • Network Security in 5G - threats, vulnerabilities and mitigation strategies

Hilton Hatitye Chisora 1, *, Munashe Naphtali Mupa 2, Irene Chiedza Chitate 3, Kelvin Gyimah Agyei 4, Ken Mudzingwa 5 and Rodney Chiwanga 6

1 Yeshiva University, 

2 Hult International Business School, 

3 Arizona State University, 

4 University of Memphis,

5 Yeshiva University, 

6 Yeshiva University, 

Review Article

World Journal of Advanced Research and Reviews, 2026, 29(03), 884-895

Article DOI: 10.30574/wjarr.2026.29.3.0598

DOI url: https://doi.org/10.30574/wjarr.2026.29.3.0598

Received on 02 February 2026; revised on 09 March 2026; accepted on 12 March 2026

The implementation of fifth-generation (5G) mobile communication technology can be considered the biggest step in the contemporary global telecommunications environment, as it has better performance potential, a much lower latency rate, and is compatible with a wide range of network devices. Still, this new technology has numerous security risks that should be taken into consideration to ensure the integrity and privacy of the network technologies. The design of 5G network technology shall be used in our research paper to fully indicate the vulnerabilities that arise in the network due to the reliance of the network on software-defined networks, network function virtualisation, and network slicing technology.   In addition, the paper also addresses the security issues of the massive attack surface that 5G networks can create, such as the issues of the greater number of devices, edge computing, and supply chains. In order to overcome these security issues in the 5G technology, the paper suggests mechanisms to overcome security vulnerabilities in architectures as well as security at the network level (Singh et al, 2024).  A great focus has been put on the security of various components of the 5G network, including core and edge devices and the necessity to take advantage of AI in controlling security threats. Lastly, the paper brings out the relevance of gaps in literature in the field of 5G security, and it is important to note that more studies are needed to come up with effective and scalable security models as 5G technology continues to be implemented in the world today.

Mitigation; Network; Security; Threats; Vulnerabilities; 5G

https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2026-0598.pdf

Preview Article PDF

Hilton Hatitye Chisora, Munashe Naphtali Mupa, Irene Chiedza Chitate, Kelvin Gyimah Agyei, Ken Mudzingwa and Rodney Chiwanga. Network Security in 5G - threats, vulnerabilities and mitigation strategies. World Journal of Advanced Research and Reviews, 2026, 29(03), 884-895. Article DOI: https://doi.org/10.30574/wjarr.2026.29.3.0598.

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution