{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:29:15Z","timestamp":1773095355021,"version":"3.50.1"},"reference-count":52,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,30]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>Alongside the remarkable evolution of cellular communication to 5G networks, significant security and privacy challenges have risen which can affect the widespread adoption of advanced communication technologies. In this context, the purpose of this paper is to examine research within security and privacy for 5G-based systems highlighting contributions made by the research community and identify research trends within different subdomains of 5G security where open issues still exist.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>This paper uses a bibliographic approach to review the state-of-the-art in the field of 5G security and is the pioneering effort to investigate 5G security research using this methodology. Specifically, the paper presents a quantitative description of the existing contributions in terms of authors, organizations, and countries. It then presents detailed keyword and co-citation analysis that shows the quantity and pattern of research work in different subfields. Finally, 5G security areas are identified having open challenges for future research work.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>The study shows that China leads the world in terms of published research in the field of 5G security with USA and India ranked second and third respectively. Xidian University, China is ranked highest for number of publications and h-index followed by University Oulu and AALTO University Finland. IEEE Access, Sensors and IEEE Internet of Things Journal are the top publication venues in the field of 5G security. Using VOSViewer aided analysis with respect to productivity, research areas and keywords, the authors have identified research trends in 5G security among scientific community whilst highlighting specific challenges which require further efforts.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>Existing studies have focused on surveys covering state-of-the art research in secure 5G network (Zhang et al. 2019), physical layer security (Wu et al., 2018), security and privacy of 5G technologies (Khan et al., 2020) and security and privacy challenges when 5G is used in IoT (Sicari et al. 2020). However, our research has revealed no existing bibliometric studies in this area and therefore, to our best knowledge, this paper represents pioneering such effort for security within 5G.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/lht-04-2021-0133","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T23:45:45Z","timestamp":1627947945000},"page":"1097-1120","source":"Crossref","is-referenced-by-count":18,"title":["A bibliometric approach to quantitatively assess current research trends in 5G security"],"prefix":"10.1108","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0247-9097","authenticated-orcid":false,"given":"M. Najmul Islam","family":"Farooqui","sequence":"first","affiliation":[{"name":"NED University of Engineering and Technology , Karachi,","place":["Pakistan"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0424-9498","authenticated-orcid":false,"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[{"name":"Birmingham City University , Birmingham,","place":["UK"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0011-9525","authenticated-orcid":false,"given":"Muhammad Mubashir","family":"Khan","sequence":"additional","affiliation":[{"name":"NED University of Engineering and Technology , Karachi,","place":["Pakistan"]}]}],"member":"140","published-online":{"date-parts":[[2021,8,4]]},"reference":[{"key":"2025072820460950200_ref001","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jnca.2016.08.022","article-title":"The rise of \u2018malware\u2019: bibliometric analysis of malware study","volume":"75","author":"Ab Razak","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"2025072820460950200_ref002","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","article-title":"Mobile edge computing: a survey","volume":"5","author":"Abbas","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"2025072820460950200_ref003","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","article-title":"Next generation 5G wireless networks: a comprehensive survey","volume":"18","author":"Agiwal","year":"2016","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"1","key":"2025072820460950200_ref004","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","article-title":"Overview of 5G security challenges and solutions","volume":"2","author":"Ahmad","year":"2018","journal-title":"IEEE Communications Standards Magazine"},{"issue":"4","key":"2025072820460950200_ref005","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","article-title":"Security for 5G and beyond","volume":"21","author":"Ahmad","year":"2019","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2025072820460950200_ref006","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","article-title":"A survey on 5G networks for the internet of things: communication technologies and challenges","volume":"6","author":"Akpakwu","year":"2017","journal-title":"IEEE Access"},{"issue":"9","key":"2025072820460950200_ref007","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s12243-019-00721-x","article-title":"A survey on authentication and access control for mobile networks: from 4G to 5G","volume":"74","author":"Behrad","year":"2019","journal-title":"Annals of Telecommunications"},{"key":"2025072820460950200_ref008","first-page":"281","article-title":"5G-SSAAC: slice-specific authentication and access control in 5G","author":"Behrad","year":"2019"},{"issue":"2","key":"2025072820460950200_ref009","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02016546","article-title":"Historical scientometrics? Mapping over 70 years of biological safety research with coword analysis","volume":"27","author":"Cambrosio","year":"1993","journal-title":"Scientometrics"},{"issue":"1","key":"2025072820460950200_ref010","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","article-title":"A survey on security aspects for 3GPP 5G networks","volume":"22","author":"Cao","year":"2019","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"5","key":"2025072820460950200_ref011","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s11036-015-0665-5","article-title":"Software-defined mobile networks security","volume":"21","author":"Chen","year":"2016","journal-title":"Mobile Networks and Applications"},{"key":"2025072820460950200_ref012","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.comcom.2018.02.006","article-title":"Cognitive internet of vehicles","volume":"120","author":"Chen","year":"2018","journal-title":"Computer Communications"},{"issue":"3","key":"2025072820460950200_ref013","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF02016875","article-title":"A coword analysis of scientometrics","volume":"31","author":"Courtial","year":"1994","journal-title":"Scientometrics"},{"issue":"5","key":"2025072820460950200_ref501","doi-asserted-by":"crossref","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","article-title":"Blockchain for internet of things: a survey","volume":"6","author":"Dai","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"2025072820460950200_ref014","doi-asserted-by":"crossref","first-page":"59200","DOI":"10.1109\/ACCESS.2019.2914359","article-title":"Key management for beyond 5G mobile small cells: a survey","volume":"7","author":"De Ree","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"2025072820460950200_ref015","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.joi.2010.10.008","article-title":"Scientific collaboration and endorsement: network analysis of coauthorship and citation networks","volume":"5","author":"Ding","year":"2011","journal-title":"Journal of Informetrics"},{"issue":"4","key":"2025072820460950200_ref016","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","article-title":"Authentication handover and privacy protection in 5G hetnets using software-defined networking","volume":"53","author":"Duan","year":"2015","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"2025072820460950200_ref017","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1007\/s11192-015-1645-z","article-title":"The bibliometric analysis of scholarly production: how great is the impact?","volume":"105","author":"Ellegaard","year":"2015","journal-title":"Scientometrics"},{"key":"2025072820460950200_ref018","doi-asserted-by":"crossref","first-page":"4850","DOI":"10.1109\/ACCESS.2017.2779146","article-title":"Security for 5G mobile wireless networks","volume":"6","author":"Fang","year":"2017","journal-title":"IEEE Access"},{"key":"2025072820460950200_ref019","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.infsof.2016.09.002","article-title":"A systematic literature review of literature reviews in software testing","volume":"80","author":"Garousi","year":"2016","journal-title":"Information and Software Technology"},{"key":"2025072820460950200_ref020","volume-title":"Newsroom Press Release (2020)","author":"Gartner","year":"2020"},{"issue":"1","key":"2025072820460950200_ref021","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1109\/TVT.2017.2745110","article-title":"Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network","volume":"67","author":"Gupta","year":"2017","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2025072820460950200_ref022","volume-title":"Market Share Mobile Phone Worldwide","author":"Gupta","year":"2020"},{"issue":"2","key":"2025072820460950200_ref023","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","article-title":"Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey","volume":"21","author":"Hamamreh","year":"2018","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"2025072820460950200_ref502","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1163\/22125868-12340005","article-title":"International research collaboration among academics in China and South Korea","volume":"1","author":"Jung","year":"2012","journal-title":"International Journal of Chinese Education"},{"issue":"1","key":"2025072820460950200_ref024","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions","volume":"22","author":"Khan","year":"2019","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"2025072820460950200_ref025","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/MNET.001.1900261","article-title":"Toward slicing-enabled multi-access edge computing in 5G","volume":"34","author":"Ksentini","year":"2020","journal-title":"IEEE Network"},{"key":"2025072820460950200_ref026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","article-title":"5G internet of things: a survey","volume":"10","author":"Li","year":"2018","journal-title":"Journal of Industrial Information Integration"},{"issue":"4","key":"2025072820460950200_ref027","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","article-title":"The 2015 Ukraine blackout: implications for false data injection attacks","volume":"32","author":"Liang","year":"2016","journal-title":"IEEE Transactions on Power Systems"},{"issue":"2","key":"2025072820460950200_ref503","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s11192-011-0575-7","article-title":"The proximity of co-citation","volume":"91","author":"Liu","year":"2012","journal-title":"Scientometrics"},{"issue":"4","key":"2025072820460950200_ref505","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","article-title":"Applications of deep reinforcement learning in communications and networking: a survey","volume":"21","author":"Luong","year":"2019","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"2025072820460950200_ref028","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A survey on mobile edge computing: the communication perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"3","key":"2025072820460950200_ref029","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/JSAC.2018.2815418","article-title":"Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT","volume":"36","author":"Ni","year":"2018","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2025072820460950200_ref030","doi-asserted-by":"crossref","first-page":"99999","DOI":"10.1109\/ACCESS.2020.2997702","article-title":"5G network slicing: a security overview","volume":"8","author":"Olimid","year":"2020","journal-title":"IEEE Access"},{"key":"2025072820460950200_ref031","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","article-title":"A survey on 5G: the next generation of mobile communication","volume":"18","author":"Panwar","year":"2016","journal-title":"Physical Communication"},{"key":"2025072820460950200_ref032","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02857-4","article-title":"A lightweight authentication scheme for 5G mobile communications: a dynamic key approach","author":"Pothumarti","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"2025072820460950200_ref033","volume-title":"The 5G Economy","author":"Qualcomm","year":"2020"},{"key":"2025072820460950200_ref034","doi-asserted-by":"crossref","first-page":"107283","DOI":"10.1016\/j.comnet.2020.107283","article-title":"A privacy preserving scheme for vehicle-to-everything communications using 5G mobile edge computing","volume":"176","author":"Rasheed","year":"2020","journal-title":"Computer Networks"},{"issue":"1","key":"2025072820460950200_ref035","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1007\/s11192-014-1402-8","article-title":"Mapping the intellectual structure of scientometrics: a co-word analysis of the journal scientometrics (2005\u20132010)","volume":"102","author":"Ravikumar","year":"2015","journal-title":"Scientometrics"},{"key":"2025072820460950200_ref036","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09578-y","article-title":"Blockchain-based trust establishment mechanism in the internet of multimedia things","author":"Ren","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"2025072820460950200_ref037","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s12243-020-00799-8","article-title":"Survey on physical layer security for 5G wireless networks","volume":"76","author":"S\u00e1nchez","year":"2021","journal-title":"Annals of Telecommunications"},{"key":"2025072820460950200_ref038","doi-asserted-by":"crossref","first-page":"107345","DOI":"10.1016\/j.comnet.2020.107345","article-title":"5G in the Internet of Things era: an overview on security and privacy challenges","volume":"179","author":"Sicari","year":"2020","journal-title":"Computer Networks"},{"issue":"4","key":"2025072820460950200_ref039","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1002\/asi.4630240406","article-title":"Co-citation in the scientific literature: a new measure of the relationship between two documents","volume":"24","author":"Small","year":"1973","journal-title":"Journal of the American Society for Information Science"},{"issue":"2","key":"2025072820460950200_ref040","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","article-title":"Software survey: VOSviewer, a computer program for bibliometric mapping","volume":"84","author":"Van Eck","year":"2010","journal-title":"Scientometrics"},{"issue":"1","key":"2025072820460950200_ref041","first-page":"1","volume":"1","author":"Van Eck","year":"2013","journal-title":"VOSviewer Manual"},{"issue":"4","key":"2025072820460950200_ref042","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A survey of physical layer security techniques for 5G wireless networks and challenges ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2025072820460950200_ref043","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/ACCESS.2016.2575863","article-title":"Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations","volume":"4","author":"Xu","year":"2016","journal-title":"IEEE Access"},{"key":"2025072820460950200_ref511","first-page":"1","article-title":"Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5G networks","author":"Xu","year":"2019","journal-title":"Mobile Networks and Applications"},{"key":"2025072820460950200_ref512","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.comnet.2018.01.021","article-title":"A comprehensive survey of network function virtualization","volume":"133","author":"Yi","year":"2018","journal-title":"Computer Networks"},{"key":"2025072820460950200_ref044","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A survey on edge computing for the Internet of Things","volume":"6","author":"Yu","year":"2017","journal-title":"IEEE Access"},{"key":"2025072820460950200_ref045","doi-asserted-by":"crossref","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","article-title":"Towards secure 5G networks: a survey","volume":"162","author":"Zhang","year":"2019","journal-title":"Computer Networks"},{"issue":"7","key":"2025072820460950200_ref046","doi-asserted-by":"crossref","first-page":"7940","DOI":"10.1109\/TVT.2020.2994144","article-title":"Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks","volume":"69","author":"Zhang","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-04-2021-0133\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/lht\/article-pdf\/39\/4\/1097\/1794379\/lht-04-2021-0133.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/lht\/article-pdf\/39\/4\/1097\/1794379\/lht-04-2021-0133.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:46:18Z","timestamp":1753749978000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/lht\/article\/39\/4\/1097\/266515\/A-bibliometric-approach-to-quantitatively-assess"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11,30]]}},"URL":"https:\/\/doi.org\/10.1108\/lht-04-2021-0133","relation":{},"ISSN":["0737-8831","2054-166X"],"issn-type":[{"value":"0737-8831","type":"print"},{"value":"2054-166X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,4]]}}}