Logo PTI Logo icetasi

Proceedings of the 2025 International Conference on Engineering, Technology and Applied Science Innovations

Annals of Computer Science and Information Systems, Volume 46

Regulatory and Governance Aspects of 5G and Beyond

, , ,

DOI: http://dx.doi.org/10.15439/2025I28

Citation: Proceedings of the 2025 International Conference on Engineering, Technology and Applied Science Innovations, Gerasimos Pylarinos, Christos P. Antonopoulos, George Syrrokostas, Panteleimon Apostolopoulos, Stratos David (eds). ACSIS, Vol. 46, pages 5359 ()

Full text

Abstract. The rapid deployment of 5G networks introduces new opportunities for digital transformation while exposing critical vulnerabilities across technical and regulatory domains. This paper offers a comprehensive exploration of the European cybersecurity landscape for 5G and beyond, analyzing how legislative frameworks such as GDPR, the EECC, and NIS2 shape telecom security practices. It examines the roles of key actors including ENISA, national regulatory authorities, and international bodies, and discusses how telecom operators can implement and operationalize these frameworks. The paper further presents a practical use case demonstrating how the SAND5G platform supports compliance and incident response through contextualized risk assessment and real-time threat mitigation. Looking ahead, it outlines future governance challenges and emerging technologies---such as quantum cryptography, zero trust architectures, and AI-driven security---required to secure next-generation networks like 6G. The study underscores the need for dynamic, multi-layered, and forward-looking cybersecurity strategies that balance innovation with resilience.

References

  1. Cybersecurity and resiliency of Europe’s communications infrastructures and networks, Follow-up to the Nevers Call of 9 March 2022, NIS Cooperation Group, 21 February 2024.
  2. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).
  3. Directive (EU) 2002/58 of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications).
  4. Directive (EU) 2018/1972 of the European Parliament and the Council establishing the European Electronic Communications Code.
  5. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (NIS 1 Directive).
  6. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive).
  7. NIS Cooperation Group, Technical Guideline: Security Measures for Top-Level-Domain Name Registries, 23 March 2022.
  8. Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the resilience of critical entities.
  9. Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification.
  10. Proposal for a Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020, COM/2022/454 final.
  11. ENISA’s ECASEC Expert Group portal, https://resilience.enisa.europa.eu/article-13.
  12. L. Mucchi et al., "Physical-Layer Security in 6G Networks," in IEEE Open Journal of the Communications Society, vol. 2, pp. 1901-1914, 2021, https://dx.doi.org/10.1109/OJCOMS.2021.3103735.
  13. E. O. Frimpong, B.-H Oh, T. Kim, I. Bang, “Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks”, Sensors 2023, 23, 1881. https://doi.org/10.3390/s23041881.
  14. C. R. García et al., “Secure and Agile 6G Networking – Quantum and AI Enabling Technologies”, 23rd International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania, 2023, pp. 1-4, https://dx.doi.org/10.1109/ICTON59386.2023.10207418.
  15. H. Sedjelmaci, K. Tourki and N. Ansari, “Enabling 6G Security: The Synergy of Zero Trust Architecture and Artificial Intelligence”, in IEEE Network, https://dx.doi.org/10.1109/MNET.2023.3326003.
  16. M. A. Enright, E. Hammad and A. Dutta, “A Learning-Based Zero-Trust Architecture for 6G and Future Networks”, 2022 IEEE Future Networks World Forum (FNWF), Montreal, QC, Canada, 2022, pp. 64-71, https://dx.doi.org/10.1109/FNWF55208.2022.00020.
  17. Abdulrahman Yarali, “Artificial Intelligence and Machine Learning in the Era of 5G and 6G Technology”, in From 5G to 6G: Technologies, Architecture, AI, and Security , IEEE, 2023, pp.65-72, https://dx.doi.org/10.1002/9781119883111.ch4.
  18. M. M. Saeed, R. A. Saeed,M. Abdelhaq, R. Alsaqour, M. K. Hasan, R. A. Mokhtar, “Anomaly Detection in 6G Networks Using Machine Learning Methods”, Electronics 2023, 12, 3300. https://doi.org/10.3390/electronics12153300.
  19. Samuthira Pandi V, Anitha Juliette Albert, K. Naresh Kumar Thapa, R. Krishnaprasanna, “A novel enhanced security architecture for sixth generation (6G) cellular networks using authentication and acknowledgement (AA) approach”, Results in Engineering, Vol. 21, 2024, https://doi.org/10.1016/j.rineng.2023.101669.
  20. I. Darman, M. K. Mahmood, S. A. Chaudhry, S. A. Khan and H. Lim, "Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications," in IEEE Access, vol. 10, pp. 92774-92787, 2022, https://dx.doi.org/10.1109/ACCESS.2022.3198642.
  21. Z. Ren, X. Li, Q. Jiang, Y. Wang, J. Ma and C. Miao, “Network Slicing in 6G: An Authentication Framework for Unattended Terminals”, in IEEE Network, vol. 37, no. 1, pp. 78-86, January/February 2023, https://dx.doi.org/10.1109/MNET.112.2100738.
  22. I. H. Abdulqadder and S. Zhou, “SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment”, in IEEE Internet of Things Journal, vol. 9, no. 18, pp. 18079-18097, 15 Sept.15, 2022, https://dx.doi.org/10.1109/JIOT.2022.3161838.
  23. Muhammad Zulfiqar Ali, etal, “Quantum for 6G communication: A perspective”, IET Quantum Communication, Vol. 4, Issue 3, 2023, https://doi.org/10.1049/qtc2.12060.