A Survey of Security Threats and Challenges Related To 5G Networks in Saudi Arabia

Authors

  • Abeer Abdullah Alsadhan Computer Science Department, Imam Abdulrahman bin Faisal University, Dammam 31441, Saudi Arabia.

DOI:

https://doi.org/10.48161/qaj.v5n3a1849

Keywords:

5G, Saudi Arabia, security threats, risk assessment, privacy, IOT.

Abstract

Purpose: The widespread adoption of 5G technologies has introduced critical security challenges across cloud infrastructures, user equipment, and the Internet of Things (IoT). This study aims to evaluate and quantify perceived risk levels of diverse 5G-related security threats within the Saudi Arabian context, offering localized insight into regional vulnerabilities. Methods: A cross-sectional survey was distributed among 398 cybersecurity professionals across Saudi Arabia, with 375 valid responses analyzed. The study assessed multiple threat dimensions including privacy breaches, communication link attacks, and cloud-IoT security concerns. Additionally, 15 expert interviews were conducted to enrich the findings with qualitative perspectives. Statistical methods included descriptive analysis, logistic regression, Welch’s t-test, and ANOVA to evaluate risk perception across different sectors and regions. Results: The analysis revealed high perceived risks associated with routing attacks (Mean = 4.12), impersonation (Mean = 3.99), and Denial of Service (DoS) threats (Mean = 3.85). Broader challenges included vulnerabilities in user equipment (Mean = 4.43), lack of specialized tools or training (Mean = 4.35), and decentralized security concerns (Mean = 4.11). Experience level was found to significantly predict DoS threat perception (p < 0.01), while Saudi participants rated risks higher than their EU and U.S. counterparts (p < 0.05). Conclusion: The study concludes that user-device security, cloud integration issues, and insufficient regulatory mechanisms are primary areas of concern. By incorporating region-specific factors—such as extreme environmental conditions and regulatory immaturity—the paper offers actionable recommendations including AI-enhanced detection, Zero Trust frameworks, and sector-specific policy enhancements. These findings contribute to a more resilient and context-aware 5G security posture aligned with Saudi Arabia’s Vision 2030 objectives.

Downloads

Download data is not yet available.

References

Akbar, M. A., Khan, A. A., Hyrynsalmi, S., & Khan, J. A. (2024). 6G secure quantum communication: A success probability prediction model. Automated Software Engineering, 2024, 1-15.

Pali, R., Amin, R., & Abdussami, M. (2024). Autonomous vehicle security: Current survey and future research challenges. Security and Privacy, 2024, 1-18.

Karakaya, A., & Ulu, A. (2024). A survey on post-quantum based approaches for edge computing security. Wiley Interdisciplinary Reviews, 2024, 1-12.

Rachakonda, L. P., Siddula, M., & Sathya, V. (2024). A comprehensive study on IoT privacy and security challenges with a focus on spectrum sharing in Next-Generation networks (5G/6G/beyond). *High-Confidence Computing, 2024*, 1-23.

Wang, G., Wu, J., & Trik, M. (2024). A novel approach to reduce video traffic based on understanding user demand and D2D communication in 5G networks. IETE Journal of Research, 2024, 1-10.

De Simone, L., Di Mauro, M., & Natella, R. (2024). Performance and availability challenges in designing resilient 5G architectures. IEEE Transactions on Network and Service Management, 2024, 1-20.

Tlili, F., Ayed, S., & Fourati, L. C. (2024). Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions. Internet of Things, 2024, 1-18.

Zhou, L., Jiang, M., Duan, R., Zuo, F., & Li, Z. (2024). Barriers and implications of 5G technology adoption for hospitals in Western China: Integrated interpretive structural modeling and decision-making trial. JMIR mHealth and uHealth, 2024, 1-15.

Stanco, G., Navarro, A., Frattini, F., Ventre, G., & Botta, A. (2024). A comprehensive survey on the security of low power wide area networks for the Internet of Things. ICT Express, 2024, 1-20.

Achaal, M., Adda, M., Berger, M., Ibrahim, H., & Awde, A. (2024). Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecurity, 2024, 1-12.

Wang, Z., Fok, K. W., & Thing, V. L. L. (2024). Exploring emerging trends in 5G malicious traffic analysis and incremental learning intrusion detection strategies. arXiv preprint arXiv:2402.14353, 2024, 1-18.

Bhandari, A. G., IEEE, S. T., IEEE, J. J. P. C. R., & IEEE. (2024). Latency optimized C-RAN in optical backhaul and RF fronthaul architecture for beyond 5G network: A comprehensive survey. Computer Networks, 2024, 1-15.

Mohammed, Z. K., Mohammed, M. A., Abdulkareem, K. H., Zebari, D. A., Lakhan, A., Marhoon, H. A., ... & Martinek, R. (2024). A metaverse framework for IoT-based remote patient monitoring and virtual consultations using AES-256 encryption. Applied Soft Computing, 158, 111588.

Al-Bahri, M., Alkishri, W., Ahmed, F. Y., Alshar'e, M., & Al Maskari, S. (2024). Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches. Qubahan Academic Journal, 4(1), 224-239.

Javeed, M. S., Saeed, M. S., Ahmad, I., Adil, M., & Kumar, P. (2024). Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions. Future Generation Computer Systems, 2024, 1-25.

Omote, K., Inoue, Y., Terada, Y., Shichijo, N., & Shirai, T. (2024). A scientometrics analysis of cybersecurity using e-csti. IEEE Access, 2024, 1-15.

Yang, L., El Rajab, M., Shami, A., & others. (2024). Enabling AutoML for zero-touch network security: Use-case driven analysis. IEEE Transactions on Network and Service Management, 2024, 1-18.

Goutham, N., & Mishra, P. K. (2024). An efficient QGA-based model for resource allocation in D2D communication for 5G-HCRAN networks. IETE Journal of Research, 2024, 1-12.

AlMarshoud, M., Kiraz, M. S., & Al-Bayatti, A. H. (2024). Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions. ACM Computing Surveys, 2024, 1-20.

Li, T., Pan, Y., & Zhu, Q. (2024). Decision-dominant strategic defense against lateral movement for 5G zero-trust multi-domain networks. Network Security Empowered by Artificial Intelligence, 2024, 1-18.

Jubair, M. A., Mostafa, S. A., Zebari, D. A., Hariz, H. M., Abdulsattar, N. F., Hassan, M. H., ... & Alouane, M. T. H. (2022). A QoS aware cluster head selection and hybrid cryptography routing protocol for enhancing efficiency and security of VANETs. IEEE Access, 10, 124792-124804.

Al Hamadani, R. A. J., Mosleh, M., Al-Sallami, A. H. A., & Sadeghi, R. (2025). Improvement of Network Traffic Prediction in Beyond 5G Network using Sparse Decomposition and BiLSTM Neural Network. Qubahan Academic Journal, 5(2), 156-176.

Harvanek, M., Bolcek, J., Kufa, J., Polak, L., Simka, M., & Marsalek, R. (2024). Survey on 5G physical layer security threats and countermeasures. Sensors, 24(17), 5523.

Alqahtani, H., & Kumar, G. (2024). Cybersecurity in electric and flying vehicles: Threats, challenges, AI solutions & future directions. ACM Computing Surveys, 57(4), 1-34.

Qu, A., Shen, Q., & Ahmadi, G. (2024). Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network. Computers & Security, 145, 104004.

Published

2025-09-04

How to Cite

Abdullah Alsadhan , A. (2025). A Survey of Security Threats and Challenges Related To 5G Networks in Saudi Arabia. Qubahan Academic Journal, 5(3), 474–501. https://doi.org/10.48161/qaj.v5n3a1849

Issue

Section

Articles