Journal Press India®

Enhanced Cybersecurity Framework for 5G-Integrated Oil and Gas Industry

Vol 2 , Issue 1 , January - June 2022 | Pages: 8-22 | Research Paper  

https://doi.org/10.17492/computology.v2i1.2202


Author Details ( * ) denotes Corresponding author

1. * Daniel Dauda Wisdom, Department of Computer Science, Chrisland University Abeokuta, Ogun State, Nigeria (ddaniel@chrislanduniversity.edu.ng)
2. Olufunke Rebecca Vincent, Federal University of Agriculture Abeokuta, Nigeria (vincent.rebecca@gmail.com)
3. Oduntan Odunayo Esther, Department of Computer Science, Chrisland University Abeokuta, Ogun State, Nigeria (eoduntan@chrislanduniversity.edu.ng)
4. Kingsley T. Igulu, Department of Computer Science, Ignatius Ajuru University, Port Harcourt, Nigeria (igulu.kingsley@iaue.edu.ng)
5. Alpha Baba Garba, Department of Computer Science, Kaduna State College of Education Gidan Waya, Nigeria (babandolee@gmail.com)

The rapid evolution of technology, particularly the adoption of fifth-generation (5G) wireless networks, has introduced both unprecedented opportunities and challenges across various industries. Among these, the oil and gas sector plays a pivotal role in global economies and requires advanced measures to ensure the security of its critical infrastructure. This paper presents a comprehensive approach to address the security implications of integrating 5G networks into the oil and gas industry, with a specific focus on safeguarding operations through an Enhanced Cybersecurity Framework. In the proposed scheme, an extensive literature review was conducted to understand the potential impacts of 5G integration on the oil and gas industry's internet security. The review explored existing research, methodologies, and best practices in related fields, forming the foundation for the proposed framework. Drawing insights from this review, a multi-faceted algorithm, termed Secure 5G-Enabled Oil and Gas Infrastructure (S5G-OGI), was devised. The S5G-OGI algorithm outlines ten distinct steps encompassing risk assessment, adaptive access control, traffic analysis, data integrity using blockchain, encrypted communication, intrusion detection, SIEM integration, continuous monitoring, employee training, and regular security audits. To demonstrate the feasibility and practical implementation of the proposed algorithm, a Python programming language was utilized. A simplified version of the algorithm was translated into Python code, demonstrating how each step contributes to enhancing the security of the oil and gas industry's critical infrastructure. While the implemented code serves as an illustrative example, it highlights the essence of each algorithmic step and underscores the technical viability of the proposed framework. The proposed scheme underscores the critical importance of securing the oil and gas industry's critical infrastructure as it transitions to 5G networks. By amalgamating a comprehensive literature review, a thoughtfully designed algorithm, and practical implementation in Python, the Enhanced Cybersecurity Framework offers a roadmap to ensure the resilience, integrity, and security of operations within the evolving landscape of the 5G-integrated oil and gas industry. As technology continues to advance, proactive security measures will be essential to mitigate risks and fortify the foundation of this essential sector.

Keywords

5G Network; Cyber Security; Critical Infrastructure; Oil and Gas Industry; Nigeria


  1. Abbas, F., Song, H., Saba, S., Ali, A., Yasin, A., Umair, M., & Qureshi, M. I. (2020). A Comprehensive Survey of 5G Security and Privacy Challenges and Solutions. 

  2. Ajadi, M. O., Ogunleye, O. D., & Adeosun, O. O. (2020). 5G security: Threats, requirements and challenges. Journal of Information Security and Applications, 54, 102583.

  3. Alshamrani, M., Li, F., Wang, L., & Jiang, Y. (2020). 5G security: a survey of threats and solutions. Journal of Network and Computer Applications, 168, 102747. https://doi.org/10.1016/j.jnca.2020.102747

  4. Alshammari, H., Al-Dhief, F. T., Alshammari, N. A., & Almutairi, A. M. (2020). 5G  security: a review of threats and solutions. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/8844210

  5. Alshamrani, M., Alharbi, R., & Almogren, A. (2020). 5G security: A survey of threats and solutions. International Journal of Advanced Computer Science and Applications,  11(3), 146-152.

  6. Alshammari, H., Almutairi, A., & Alshammari, B. (2020). 5G security: A review of threats and solutions. Journal of King Saud University-Computer and Information Sciences,  32(6), 731-738.

  7. Kaloxylos, A., & Kambourakis, G. (2021). Enhancing 5G security through intelligent traffic profiling. IEEE Transactions on Network and Service Management, 18(1), 179-193

  8. Lim, J. T., Kim, D. J., Lee, S. J., & Lee, D. H. (2021). 5G Security: Threats and Countermeasures.

  9. Olorundare, J. K., Olorundare, A. O., & Sayyadi, S. (2017). Internet of things Prospect in Nigeria: Challenges and Solutions. 2017 IEEE 3rd International Conference on  Electro-Technology for National Development (NIGERCON).

  10. Park, S., Kim, D., Park, Y., Cho, H., Kim, D., & Kwon, S. (2021). 5G Security Threat Assessment in Real Networks. Sensors, 21, 5524. https://doi.org/10.3390/s21165524.

  11. Sullivan, S., Brighente, A., Kumar, S. A. P., & Conti, M. (2021). 5G Security Challenges and Solutions: A Review by OSI Layers. IEEE Access, 9, 84604-84625. https://doi.org/10.1109/access.2021.3087684

  12. Vasilakos, A. V., Kaloxylos, A., & Kambourakis, G. (2020). Secure and privacy-preserving 5G communications: A survey. IEEE Transactions on Network and Service  Management, 17(4), 1872-1895.

  13. Li, F., Qiu, M., & Wu, Y. (2020). 5G security: Analysis of threats and solutions. IEEE  Access, 8, 21800-21809.

  14. Li, F., Wang, X., Wang, L., & Jiang, Y. (2020). 5G security: analysis of threats and solutions.  Wireless Communications and Mobile Computing, 2020, 1-12. https://doi.org/10.1155/2020/8832434

  15. Wang, Y., Gao, X., & Wang, Y. (2021). Privacy-preserving 5G network slicing: Issues and challenges. IEEE Wireless Communications, 28

  16. Li, Y., & Wang, X (2021). Blockchain-based secure and trustworthy 5G network slices. IEEE Transactions on Network and Service Management, 18(2), 524-536.

  17. Zahoor, S., Ahmad, I., Ben Othman, M. T., Mamoon, A., Ur Rehman, A., Shafiq, M., & Hamam, H. (2022). Comprehensive Analysis of Network Slicing for the Developing  Commercial Needs and Networking Challenges. Sensors, 22(17), 6623.  https://doi.org/10.3390/s22176623.

  18. Gudu, E. B. Wisdom, D. D. Gudu, G. J. Ahmad, M. A. Isaac. S. Akinyemi, A. E. (2020). Data Science for Covid-19 (Mathematical Recipe for Curbing Corona Virus (Covid- 19) Transmission Dynamics, Elsevier, August, 2021.

  19. Kim, J., & Kang, J. (2020). 5G security: Threats and countermeasures. IEEE Wireless  Communications, 27(4), 36-43.

  20. Khan, J. A., & Chowdhury, M. M. (2021, May). Security Analysis of 5G Network. In 2021 International Conference on Emerging Trends in Information Technology (EIT) (pp.  1-5). IEEE. https://doi.org/10.1109/EIT51626.2021.9491923.

  21. Wisdom, D. D., Tambuwal, A. Y., Khalid, H., Ajayi, E. A., & Chun, P. B. (2018). Enhanced model for computer viruses counter measures. In 1st International Conference on Education and Development (ITED), Baze University, Abuja Nigeria.

  22. Gudu, E. B. Wisdom, D. D. Ahmed, M. A Akinyemi, A.E. Isaac, S. Dazi, A. J. (2020). Mathematical model for the spread and control of ebola virus by quarantine techniques, Anals Journal of computer science series, November, 2021.

  23. Wisdom, D.D. Ajayi E. A. Arinze U.C. Idris, H. Bello, U.M. Aladesote O.I. (2021). An Optimized TWIN Battery Resource Management Scheme in Wireless Networks, Lecture Notes in Networks, Vol. 217, Proceedings of Sixth International Congress on  Information and Communication Technology, Springer Nature, 2021. 978-981-16- 2101-7,511607.



  24.  
  25.  
Abstract Views: 76
PDF Views: 94

Related Articles

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.