Tackling Security Challenges in 5G Networks -

Verified

Added on  2022/09/02

|19
|4146
|17
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: - CHALLENGES IN 5G SECURITY
CHALLENGES IN 5G SECURITY
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CHALLENGES IN 5G SECURITY
Table of Contents
1. Introduction:...........................................................................................................................2
2. 5G network technology:.........................................................................................................2
3. Features of 5G network:.........................................................................................................5
3.1. Improvement in broadband:............................................................................................6
3.2. Autonomous Vehicles:....................................................................................................6
3.3. Public infrastructure safety:............................................................................................7
3.4. Remote control device:...................................................................................................7
3.5. Healthcare:......................................................................................................................7
4. Security Challenges of 5G network:......................................................................................8
5. Opportunities in 5G network:...............................................................................................13
6. Conclusion:..........................................................................................................................15
7. References:...........................................................................................................................16
Document Page
2CHALLENGES IN 5G SECURITY
1. Introduction:
5G specifically refers to the fifth generation of communications that are wireless
provisioning with the required amount of support to the field of cellular data networks. This
particular technology is considered to be the primary improvement of 4G technology that is
considered to be potentially capable enough to revolutionize the entire world that is
dependent on a daily basis upon the mobile networks1. In addition to this, the 5G technology
has been supposedly utilized IoT as a primary acceleration towards virtually acting as a boost
towards the telecommunication industry also upgrading the existing infrastructure. With the
usage of this technology and the relative implementation, it has been visibly identified that
the technology also has some major challenges in terms of security towards the existing
commodities of the digital world. This discussion primarily aims at introducing the 5G
network and identifies the challenges that the technology has a direct association2. Following
this, the report states the various features of 5G technology along with the opportunities that
shall be offered by this particular technology towards the digital world and the field of
business as well as manufacturing. Lastly, the discussion ends with a conclusion defining the
importance as well as the challenges that are associated with 5G networks in future.
2. 5G network technology:
5G is the telecommunication technology that is considered to be the fifth generation
of mobile networks that has been developed to act as a supporting hand towards the mobile
networks. This fifth generation technology is claimed to be a much awaited improvement to
the already existing technologies and as well promises to put forward a greater revolution
1 Gheisarnejad, Meysam, Mohammad-Hassan Khooban, and Tomislav Dragicevic. "The future 5G network
based secondary load frequency control in maritime microgrids." IEEE Journal of Emerging and Selected
Topics in Power Electronics (2019).
2 Osseiran, Afif, Jose F. Monserrat, and Patrick Marsch, eds. 5G mobile and wireless communications
technology. Cambridge University Press, 2016.
Document Page
3CHALLENGES IN 5G SECURITY
within the field of telecommunication and cellular networks with an additive usage of
Internet of Things (IoT)3. The adoption of this technology is already starting to take place
from the year of 2019 and have been virtually every individual telecommunication enterprises
belonging to this industry is making efforts to upgrade their existing infrastructure to offer all
of its customers with the upgraded features of 5G technology.
Figure-1: 5G-network technology
The frequency spectrum of this 5G has been separated into millimetre, low-band
waves and that of mid-band waves. The low-band makes use of similar range of frequency as
that of the previously existing 4G technology. 5G millimetre claims to be the fastest, having
can actual speed of 1-2 Gbit/s down4. The frequency of this 5G spectrum is above the count
of 24 GHz reaching until the count of 72 GHz that is above the high range of the frequency
band’s lower lying boundary.
3 Zhang, Haijun, et al. "Network slicing based 5G and future mobile networks: mobility, resource management,
and challenges." IEEE communications magazine 55.8 (2017): 138-145.
4 Singh, Rakesh Kumar, Deepika Bisht, and R. C. Prasad. "Development of 5G mobile network technology and
its architecture." International Journal of Recent Trends in Engineering & Research (IJRTER) 3.10 (2017): 196-
201.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CHALLENGES IN 5G SECURITY
The service area of the 5G networks are particularly divided into smaller sized
geographical areas that are termed as cells. Analog signals put forward the representation of
sounds as well as images that are in digitized form within the telephone and are specifically
converted with the help of Analog to digital signal converter following which, are transmitted
in bits form. All of the existing 5G enabled working devices present within the cells carry out
the communication with the help of radio waves along with a provisioned helping hand from
the antenna as well as low power transceiver present within the cell itself5. These locally
existing antennas are specifically connected with the help of telephonic network as well as
the internet having the primary inclusion of an optical fibre consisting of high bandwidth or
with the existence of a wireless backhaul connection. Unlike the other existing cellular
networks, the mobile crossing over to one cell from one cell is handed over to the newly
existing cell of a different area in an automated manner.
Hence, it can be stated that with the potential introduction of 5G networks, there is a
greater possibility of witnessing greater speed of downloads as well as uploads compared to
what was visible in the 4G LTE network. Latency as well as the time taken for the devices to
carry out communication with each other or with the wirelessly working networks will be
greatly reduced by this network as well.
Following this, the particular shift towards 5G from that of the traditional 4G will
greatly help the change within interaction on a daily basis within individuals. In addition to
the change in the way of interaction, 5G is also considered to be a primary contributor
towards introduction and improvement in autonomous vehicles. Such autonomous vehicles
with a potential helping hand from 5G shall provision the vehicles with the ability to carry
5 Yousaf, Faqir Zarrar, et al. "NFV and SDN—Key technology enablers for 5G networks." IEEE Journal on
Selected Areas in Communications 35.11 (2017): 2468-2478.
Document Page
5CHALLENGES IN 5G SECURITY
out communication with other autonomous vehicles6. Such communication can greatly allow
cars to provision other cars with the knowledge of road condition as well as offer with
information regarding performance to the automakers. Such vehicular interaction can act as a
major boon towards a great reduction of accidents that take place on road and lead to
unavoidable consequences.
Lastly, the introduction of 5G will provision the cities and other municipalities with
the allowance to operate with greater efficiency. In addition to this, the utility companies will
also have the added provision to monitor the usage, sensors notifying the public departments
regarding flooding of drains or streetlights going off. This can allow the municipalities to
quickly act towards the same and bring back normalized conditions.
With the increasing technologies and the relative amount of digitalization that 5G
promises to bring in, there is an increasing demand for an improvement in the healthcare
sector as well that is much evident from the 5G technology shall bring with itself7. Specific
growth and improvements in the services of telemedicine, physical therapy with the help of
AR as well as remote recovery that shall bring in a greater efficiency for the health related
services to save time and lives of millions belonging to the global digital age.
3. Features of 5G network:
With the introduction of 5G technology the following features are supposed to be
provisioned by this particular technology as a part of innovating the digitalized global world.
The features and functionalities of 5G technology has been briefly described in the following
section.
6 Blanco, Bego, et al. "Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and
SDN." Computer Standards & Interfaces 54 (2017): 216-228.
7 Tian, Man-Wen, et al. "Research on Financial Technology Innovation and Application Based on 5G Network."
IEEE Access 7 (2019): 138614-138623.
Document Page
6CHALLENGES IN 5G SECURITY
3.1. Improvement in broadband:
Shifting over to 5G from the traditionally existing 4G technology will bring in an
effective change within the way of interaction on a regular basis. However, it can be stated
that this refers to an option for individuals if they want to keep using the mobile broadband.
Majority of the metropolitan cities make proper utilization of LTE capacity. In some
of the surrounding cities, users have already started experiencing slowdowns in their internet
or communication connectivity8. In regards to this, 5G specifically adds a huge amount of
spectrum in the bands that have still not been used in the traffic of the commercial broadband.
3.2. Autonomous Vehicles:
There is a considered expectation to visualise the increase of autonomous vehicles
with the introduction of 5G in and across the whole of United States. With the supposed
future that shall come in along with 5G, the autonomous vehicles are considered to carry out
communication with each other. Such communication shall be the likes of provisioning the
other vehicle regarding any information about the condition of the road as well as providing
the performance information to the owner and the automaker of the vehicle9. Along with this,
the vehicular communication will also save thousands of lives by letting the other vehicle let
know about braking and other things beforehand.
3.3. Public infrastructure safety:
5G network technology will provision with the allowance to the cities as well as the
municipalities to carry out the operation in a greater efficient manner. Companies that deal
with the various forms of utilities will have the provision to track the usage in a remote way10.
8 Tian, M. W., Wang, L., Yan, S. R., Tian, X. X., Liu, Z. Q., & Rodrigues, J. J. P. (2019). Research on Financial
Technology Innovation and Application Based on 5G Network. IEEE Access, 7, 138614-138623.
9 Sun, Songlin, et al. "An intelligent SDN framework for 5G heterogeneous networks." IEEE Communications
Magazine 53.11 (2015): 142-147.
10 Patel, Saurabh, Malhar Chauhan, and Kinjal Kapadiya. "5G: Future mobile technology-vision 2020."
International Journal of Computer Applications 54.17 (2012).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CHALLENGES IN 5G SECURITY
In addition to this, the sensors that shall be installed will notify the departments of the public
works regarding the breakdown and the municipalities can act in a quick manner to fix the
same.
3.4. Remote control device:
5G technology having the inclusion of a lower rate of latency, the heavy machinery
shall be controlled with the help of remote that has the capability to turn into a reality. With
the primary objective is to bring a reduction in the risk associated with the hazardous
environment, this remote control will allow the technicians with the ability to have the
control over the machinery from anywhere in the entire world.
3.5. Healthcare:
The Ultra-reliable low latency communications (URLLC) component that belongs to
the 5G technology will evidently bring a potential change within the field of healthcare. This
significant change will have a potential effect upon the field of telemedicine, physical therapy
with the use of AR, remote recovery as well as the precision surgery in the upcoming year of
the healthcare field.
Along with this, mMTC will also act a as a primary contributor towards the field of
healthcare and making it innovative and advanced for better treatment of the patients affected
with illness11. Hospitals will have the provision to put forward creation of huge sensor
networks for the monitoring of patients, prescribing of medicines as well as monitoring of the
subscriber for the insurance to determine proper treatment and the relative processes.
11 Iwamura, Mikio. "NGMN view on 5G architecture." 2015 IEEE 81st Vehicular Technology Conference (VTC
Spring). IEEE, 2015.
Document Page
8CHALLENGES IN 5G SECURITY
Figure-2: 5G availability in United States
4. Security Challenges of 5G network:
5G networks allow with the provision of connectivity with multiple devices that also
puts forward an increase in the bandwidth over the existing LTE. This has potentially put
forward a creation of threat landscape from the previously existing networks. Challenges
related to security of the 5G network is supposed to be worked towards to safeguard the
invasion of privacy and stealing of information12. In regards to this, IoT that is a primary part
of 5G enabled network is considered to be the component that has the majority of the security
related risk. Devices having the inclusion of IoT are considered to be the hardware that are
mostly attacked accounting up to 78% of the malware detection and the relative events within
the service provider for communication in the year of 2018.
The upcoming 5G technology and the relative network carry the potential capability
to explode the existing vertical industries having enabled the creation of multiple array of
newer services that also have the primary requirement of different levels of security and
12 Kachhavay, Meenal G., and Ajay P. Thakare. "5G technology-evolution and revolution." International
Journal of Computer Science and Mobile Computing 3.3 (2014): 1080-1087.
Document Page
9CHALLENGES IN 5G SECURITY
safeguarding13. In regards to this, some of the challenges in security that share a direct
association with the 5G technology are,
i) Autonomous vehicles- the threat that has a relation with the cyber-attacks that
occur within the automotive is expected to have a significant rise in the
autonomous vehicles in a wider aspect. As a safety procedure against this event
taking place, the National Highway Traffic Safety Administration is potentially
upgraded to take a step towards employing an approach for cyber security that
consists of multiple layers in regards to the technologies that provision the drivers
with required amount of assistance14.
ii) Healthcare- within the field of healthcare, the capabilities associated with 5G
provisions with a helping hand towards a faster transferring of large-sized files of
patients, remote surgery as well as monitoring over the patients with the use of
IoT devices among the other existing advances within the same field. In regards to
this, it can be stated that those existing advances within the field of healthcare as a
part of the 5G technology are in need of a greater as well as a stronger amount of
security15. Creation of risks that have the primary inclusion of medical identity
theft, medical management of data as well as invasion of the privacy that has a
relation to the health of an individual. Reports have stated that, in the year of
2018, the healthcare sector had been the target to 48% of the total breaches that
had occurred and caused by the cyber world. This also makes an addition to the
fact that potential growth of IoT will provisionally make the dealing and the
13 Hossain, Saddam. "5G wireless communication systems." American Journal of Engineering Research (AJER)
2.10 (2013): 344-353.
14 Parkvall, Stefan, et al. "NR: The new 5G radio access technology." IEEE Communications Standards
Magazine 1.4 (2017): 24-30.
15 Andrews, Jeffrey G., et al. "What will 5G be?." IEEE Journal on selected areas in communications 32.6
(2014): 1065-1082.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CHALLENGES IN 5G SECURITY
occurrences of the risks associated to cyber security more challenging as the 5G
network industry tries and makes way into the lives of human16.
iii) Smart homes- such smart homes that have been enabled by the technology off 5G
will specifically require to be safeguarded with greater as well as secure methods
of authentication like that of biometric identification, face and voice recognition
as well as the fingerprint technology that are installed into the door locks for
preventing the entry of trespassers17. In the year of 2019, a collective set of
breaches upon the Amazon’s camera for home setting had attracted the hackers
who had been able to get through to the cameras that had been installed within the
user’s home as well as the porches present on the front side.
In regards to such challenges that are associated with the increased usage of 5G
technology, the IoT devices and the relative sensors are in requirement of a more complex
authentication for the prevention of unauthorized access.
Figure-3: 5G vulnerability network
16 Ge, Xiaohu, et al. "5G ultra-dense cellular networks." IEEE Wireless Communications 23.1 (2016): 72-79.
17 Lema, Maria A., et al. "Business case and technology analysis for 5G low latency applications." IEEE Access
5 (2017): 5917-5935.
Document Page
11CHALLENGES IN 5G SECURITY
With the technologies of cloud virtualization such as the likes of Software-defined
Networking (SDN) as well as the Network Functions Virtualization (NFV) have been waiting
for the 5G networks. While, these functionalities also come along with the concerns of
security and safety. Since the presence of flexible, programmable nature as well as the open
nature of the SDN and the NFV that come forward with newer security threats18. For instance,
the network element belonging to a SDN such as the interfaces of management that can be
potentially used for the attacking of the SDN controller or might as well be the management
system and potentially bring down the proper working system as well.
Figure-4: 5G security network
In relation to the security, challenges and the relative concerns regarding the
safeguarding the 5G network the following five components of the network have been placed
forward to tackle such concerns of 5G security19. These are,
Presence of a secured edge- this puts forward the idea of ensuring the real-time
detection capability that shall be present at the edge. The respective network must
look for as well as stop the potential breaches before they potentially get successful to
reach the core of the network.
18 ZHANG, Ping, Y. Z. Tao, and Zhi ZHANG. "Survey of several key technologies for 5G." Journal on
Communications 37.7 (2016): 15-29.
19 Guey, Jiann-Ching, et al. "On 5G radio access architecture and technology [industry perspectives]." IEEE
Wireless Communications 22.5 (2015): 2-5.
Document Page
12CHALLENGES IN 5G SECURITY
Secure SDN controller- this procedure means the enabling the protocol of dynamic
security through the northbound as well as the APIs of the southbound section20.
Proactive analytics- this particular method makes use of machine learning as well as
Artificial intelligence for detecting any unusual activity that exists within the network
for indicating a particular breach. This procedure of detection has a complete
dependency upon the network patters and the trends that have been previously
learned.
Hypervisor as well as container security- this states the assurance of virtualizing the
network elements as well as protecting from the exfiltration along with the attacks
that are completely based upon the VM21. Hence, the operators of network shall
include the hypervisor inspection and the relative hardening mechanisms for guarding
against such potential attacks to the network.
Security implementing orchestration- finally this particularly means taking the
advantage of the 5G software, the architecture that is disaggregated as well as
orchestrating the VNFs and that of the NFVs for an automated reaction towards any
breach that might have taken place.
5. Opportunities in 5G network:
With the 4G was well compatible with the amount of speed in connectivity and
communication, the newly developed 5G technology will have a potential mark in the history
of enabling the procedure of distributed computing that will make the compute available to
every individual for the purpose of creating data.
20 Khodashenas, P. S., et al. "5G network challenges and realization insights." 2016 18th International
Conference on Transparent Optical Networks (ICTON). IEEE, 2016.
21 Fagbohun, O. "Comparative studies on 3G, 4G and 5G wireless technology." IOSR Journal of Electronics and
Communication Engineering 9.3 (2014): 88-94.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13CHALLENGES IN 5G SECURITY
The nature of data will fundamentally changing to become more of inbound, infused
with Artificial Intelligence and more of real-time22. The existing networks or the future
networks of 5G technology will have the necessity for addressing the scaled demand beyond
the existing data center having the containment of computing capabilities.
Figure-5: 5G technology opportunities
Intel has undertaken the driving of this network transformation to 5G with the primary
key for enabling the distribution of compute paradigm. In regards to this, the businesses
across all the existing industries will have the capability to capitalize upon the real-time data
and relative access as well as deriving the insight from the data for deploying variously
existing new services23. In relation to this, the various opportunities that might be open for the
industry and the other field of technologies have been mentioned below. These are,
22 Abdelwahab, Sherif, et al. "Network function virtualization in 5G." IEEE Communications Magazine 54.4
(2016): 84-91.
23 Chatras, Bruno, U. Steve Tsang Kwong, and Nicolas Bihannic. "NFV enabling network slicing for 5G." 2017
20th Conference on Innovations in Clouds, Internet and Networks (ICIN). IEEE, 2017.
Document Page
14CHALLENGES IN 5G SECURITY
The 5G technology carries the potential capability to transform all the industries from
all of the sectors of the global market having a specific impact upon the business
opportunities, growth in market as well as the global economy.
Intel 5G will take the world into an era of precision within the manufacturing
procedures having the access to real-time data upon billions of things connected in a
single chain.
The faster network of 5G power will enable the components of visual cloud
computing that shall transform the creation, distribution as well as consumption of
media and the relative content for all the use cases of 5G cloud gaming.
5G networks will be connected to various health solutions as well as services for
provisioning the operators with a helping hand towards meeting the smart
requirements within the field of health along with powering the personalized and
proactive care24.
This new technology network will revolutionize the future in regards to the
transportation facilities fuelling newer demands from the customers and financial
opportunities as well.
In addition to all above, 5G will also enable the retailers to reach a newer level of
personalization as well as efficiency towards provisioning the customers with better
and improved services in the retail market.
6. Conclusion:
With the increasing demands and need of the customers on a daily basis in regards to
connectivity and opportunities within the various sectors of business, 5G technology and the
relative deployment has been undertaken by the giants of communication to ensure the
24 Bhalla, Mudit Ratana, and Anand Vardhan Bhalla. "Generations of mobile wireless technology: A survey."
International Journal of Computer Applications 5.4 (2010): 26-32.
Document Page
15CHALLENGES IN 5G SECURITY
consumers with improve and enhanced connectivity for meeting the future needs. Hence, this
discussion has been carried out to describe the technological aspects of 5G network followed
by the various features that shall be provisioned by it. Following this, with the increased
improvements there is also exists various challenges to the security of 5G as well that has
been highlighted promptly. Lastly, the report states the mitigation techniques of such security
issues as well as the various opportunities that the technology might potentially provide in all
sectors of the global business.
i)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16CHALLENGES IN 5G SECURITY
7. References:
Abdelwahab, Sherif, et al. "Network function virtualization in 5G." IEEE Communications
Magazine 54.4 (2016): 84-91.
Andrews, Jeffrey G., et al. "What will 5G be?." IEEE Journal on selected areas in
communications 32.6 (2014): 1065-1082.
Bhalla, Mudit Ratana, and Anand Vardhan Bhalla. "Generations of mobile wireless
technology: A survey." International Journal of Computer Applications 5.4 (2010): 26-32.
Blanco, Bego, et al. "Technology pillars in the architecture of future 5G mobile networks:
NFV, MEC and SDN." Computer Standards & Interfaces 54 (2017): 216-228.
Chatras, Bruno, U. Steve Tsang Kwong, and Nicolas Bihannic. "NFV enabling network
slicing for 5G." 2017 20th Conference on Innovations in Clouds, Internet and Networks
(ICIN). IEEE, 2017.
Fagbohun, O. "Comparative studies on 3G, 4G and 5G wireless technology." IOSR Journal
of Electronics and Communication Engineering 9.3 (2014): 88-94.
Ge, Xiaohu, et al. "5G ultra-dense cellular networks." IEEE Wireless Communications 23.1
(2016): 72-79.
Gheisarnejad, Meysam, Mohammad-Hassan Khooban, and Tomislav Dragicevic. "The future
5G network based secondary load frequency control in maritime microgrids." IEEE Journal
of Emerging and Selected Topics in Power Electronics (2019).
Guey, Jiann-Ching, et al. "On 5G radio access architecture and technology [industry
perspectives]." IEEE Wireless Communications 22.5 (2015): 2-5.
Document Page
17CHALLENGES IN 5G SECURITY
Hossain, Saddam. "5G wireless communication systems." American Journal of Engineering
Research (AJER) 2.10 (2013): 344-353.
Iwamura, Mikio. "NGMN view on 5G architecture." 2015 IEEE 81st Vehicular Technology
Conference (VTC Spring). IEEE, 2015.
Kachhavay, Meenal G., and Ajay P. Thakare. "5G technology-evolution and revolution."
International Journal of Computer Science and Mobile Computing 3.3 (2014): 1080-1087.
Khodashenas, P. S., et al. "5G network challenges and realization insights." 2016 18th
International Conference on Transparent Optical Networks (ICTON). IEEE, 2016.
Lema, Maria A., et al. "Business case and technology analysis for 5G low latency
applications." IEEE Access 5 (2017): 5917-5935.
Osseiran, Afif, Jose F. Monserrat, and Patrick Marsch, eds. 5G mobile and wireless
communications technology. Cambridge University Press, 2016.
Parkvall, Stefan, et al. "NR: The new 5G radio access technology." IEEE Communications
Standards Magazine 1.4 (2017): 24-30.
Patel, Saurabh, Malhar Chauhan, and Kinjal Kapadiya. "5G: Future mobile technology-vision
2020." International Journal of Computer Applications 54.17 (2012).
Singh, Rakesh Kumar, Deepika Bisht, and R. C. Prasad. "Development of 5G mobile network
technology and its architecture." International Journal of Recent Trends in Engineering &
Research (IJRTER) 3.10 (2017): 196-201.
Sun, Songlin, et al. "An intelligent SDN framework for 5G heterogeneous networks." IEEE
Communications Magazine 53.11 (2015): 142-147.
Document Page
18CHALLENGES IN 5G SECURITY
Tian, M. W., Wang, L., Yan, S. R., Tian, X. X., Liu, Z. Q., & Rodrigues, J. J. P. (2019).
Research on Financial Technology Innovation and Application Based on 5G Network. IEEE
Access, 7, 138614-138623.
Tian, Man-Wen, et al. "Research on Financial Technology Innovation and Application Based
on 5G Network." IEEE Access 7 (2019): 138614-138623.
Yousaf, Faqir Zarrar, et al. "NFV and SDN—Key technology enablers for 5G networks."
IEEE Journal on Selected Areas in Communications 35.11 (2017): 2468-2478.
Zhang, Haijun, et al. "Network slicing based 5G and future mobile networks: mobility,
resource management, and challenges." IEEE communications magazine 55.8 (2017): 138-
145.
ZHANG, Ping, Y. Z. Tao, and Zhi ZHANG. "Survey of several key technologies for 5G."
Journal on Communications 37.7 (2016): 15-29.
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]