5G System and Network Security

1.Introduction

The rivalry between the various world superpowers is one of the key factors that has led to the substantial technological progress seen in this century. Nations made significant investments in technological development, especially after World Wars I and II. This century saw a lot of technological change.People personally witnessed it as the technology evolved from 2G to 3G, as well as 3G to 4G, throwing multiple challenges to network professionals as we sought to ensure service continuity while maintaining user experience targets. More recently, with the inception of 5G technology, the approach of network standard replacement has vanished away. The creation of Fifth Generation (5G) mobile networks is moving at a breakneck pace, bringing even higher speeds, lower latency, and ubiquitous access to almost every aspect of life.

2.What is 5G Mobile network?

5G wireless technology is designed to provide multi-gigabit per second peak data rates, ultra-low latency, improved reliability, huge network power, increased availability, and a more consistent user experience to a larger number of users. 5G allows for the creation of a new type of network that connects virtually anyone and everything, including computers, objects, and devices.[5] Higher performance and productivity enable new user experiences and bring new industries together.

3.Applications of 5G technology

1.High-speed mobile network

Speech and high-speed data can be transmitted effectively in 5G compared to traditional mobile transmission technologies. One of the most important characteristics of 5G technology is low latency, which is vital for autonomous driving and mission-critical applications. 5G networks will allow encrypted access to cloud storage, business application access, and virtual execution of powerful activities with increased computing capacity. New smartphone manufacturers and application developers will have more opportunities thanks to 5G wireless technology. New VoIP and smart devices will be added to the market, resulting in increased job opportunities..

5.Smart farming

Farmers can easily monitor and control their livestock using smart RFID sensors and GPS technology. Smart sensors can be used to monitor irrigation, entry, and energy use.

4.Security Attacks and threat landscape of 5G technology

There are 4 architectural features in 5G technology.Each feature has different kind of security challenges.Architectural features are mentions below with the associated security challenges.

5.3GPP standards on the security architecture of 5G technology

Building the inherently secure 5G system needed a holistic approach rather than focusing on individual parts in isolation. This is why groups like the 3GPP, ETSI, and IETF worked together to develop the 5G system, each focusing on a different aspect. The key changes in the 3GPP 5G security specification are mentioned below.Among the enhancements in 5G are improved subscriber privacy features that eliminate the IMSI catcher attack, additional higher protocol layer security measures to secure the new service-based interfaces, and integrity protection of user data over the air interface.

6.5G enabling technologies with their security threats and security solutions

1.NFV

NFV’s main aim is to decouple software from hardware. NFV can be used by network operators to virtualize various network functions such as firewalls and encryption (VMs). The network operator will automatically deploy a VM for a new network feature when a user requests it.

2.SDN

The main idea behind SDN is to decouple the control plane from network hardware and allow external control of the data plane through a logical software entity called a controller.

3MEC (Mobile Edge Computing)

Multi-access Edge Computing (MEC), also known as mobile edge computing, is a network architecture that enables cloud computing to take place at the mobile network’s edge (e.g. near Base Station).Remote servers, which are typically located well away from end-user devices, are currently used to store content and conduct online computations. By incorporating these functionalities into 5G base stations, MEC would bring those processes closer together.

DNS protocols are particularly susceptible to man-in-the-middle attacks; however, other protocols, such as cryptographic protocols that are poorly built, can also be vulnerable. This attacks sometimes mean that the attacker has control over one or more edge computers.

The two scenarios outlined above are bad enough on their own, but they will lead to even bigger problems in the future with your multi-access edge computing system and any linked networks or computers.

7.Conclusion

As a conclusion,protection will become much better as 5G deployments progress and mature.People will see more encryption, more defense at the network’s edge, and network-securing technologies like network feature virtualization, mobile edge computing, and network slicing.As 5G networks are deployed in cities across the World, the technology’s effect is growing.