Network and the Security Case Study 2022

Verified

Added on  2022/10/04

|9
|2341
|36
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
NETWORKING 0
Evaluation of 5G Network and
the Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORKING 1
Table of Contents
Introduction.................................................................................................................................................2
Comparison of cellular networks.................................................................................................................2
Architecture of 5G.......................................................................................................................................4
5G attacks on the access and core networks...............................................................................................5
DDOS attack.............................................................................................................................................5
Malware attack........................................................................................................................................5
Man in the middle attack.........................................................................................................................5
Limitations of 5G.........................................................................................................................................5
Recommendation/solution..........................................................................................................................6
Conclusion...................................................................................................................................................6
References...................................................................................................................................................7
Document Page
NETWORKING 2
Introduction
5G is defined as the fifth generation of network technology which is able to improve the performance of
communication networks and systems. It is an advanced version of 4G technology that provides large
data rate and reduces energy consumption and cost-related problems occurred in the 4G network
technology [1]. In terms of communication and security 5G technology is more effective and reliable
rather than other generations due to which it can be used for long-distance communication activities.
The key goal of this investigation is to evaluate the key aspects of 5G technologies and describe the
architecture of 5G network technology. Security is a key part of network technology which directly
impacts on the performance of computing networks. In the case of 5G technologies, there are numerous
attacks occur including malware, DDOS, phishing and so on. This report will cover the main three
sections including a comparison of cellular networks, 5G architecture, and identification of 5G attacks
and limitations of 5G networks.
Comparison of cellular networks
2G is one of the oldest mobile technologies that were developed in 1980 using digital cellular technology
and 14.64 kbps bandwidth. Security of data was a major problem linked with 2G network technology
and which also used TDMA multiplexing technology as communication spectrum. As compare with 2G
networks 3G is more effective that has the potential to 2 Mbps bandwidth by which the users can send
data over the networks in an effective manner [6]. A recent study identified that 3G technology uses
CDMA modulation techniques and wireless medium access control process that have the ability to
improve the overall performance of the networks [2].
Moreover, the data transfer rate of 3G technology is around 3.1 MB per second which is very less as
compared with 4G and 5G networks. In terms of security, 3G technology is less effective which uses
WPA as a security system that produces various kinds of risks including data breach, loss of data, cyber-
crimes and so on. In order to reduce the drawbacks of 3G technology, the developers implemented 4G
networks that are able to control and manage errors and conflict-related issues occurred in the
previously developed networks. Therefore, it is stated that with the help of 4G networks the consumers
can easily send or receive data over the networks and also reduce noise and distortions from the signals
[3]. According to Hossain, (2013) as compared with other networks, 4G networks use 2.3-2.5 GHz
communication spectrum and 2000 Mbps bandwidth by which it can be used for long-distance
Document Page
NETWORKING 3
communication purpose [4]. Furthermore, 4G networks use CDMA multiplexing technique and QPSK
modulation technique which is more effective in terms of reliability and efficiency but 2G and 3G
included less effective modulation techniques including QAM and WCDMA.
In terms of speed 4G network is more effective that provides 100 MB/sec and uses more than 200 Mbps
bandwidth by which the signal may be transferred over the networks in less time. It is identified that 4G
networks use TD-CDMA and WCDMA security techniques which are more secure and reliable as
compared with other network technologies [7]. Therefore, it is stated that 4G technology is more
secured rather than 2G, 3G and other but it is also associated with the data breach, denial of service
attacks and data loss related issues. In order to reduce the privacy and data speed-related problems, the
developers implemented advanced network technology called as 5G that has the potential to increase
the overall performance of computing networks and communication devices [16].
As compared with other generations, 5G is more secure and effective which uses more than 6 GHz
communication spectrums along with the 1 Gbps bandwidth. A recent study identified that 5G network
technologies use FBMC modulation technology which is highly recommended for communication
networks rather than other network technologies [8]. 5G technologies have the ability to provide up to
300 megabits per second network speed which is very high rather than 2G, 3G and 4G networks.
Hu, Patel, Sabella, Sprecher and Young, (2015) proposed literature and identified that 5G technology
uses OSI model as a medium access control that can manage the communication between networks and
devices used by the consumers [5]. Therefore, it is stated that the 5G is an advanced network
technology that reduced the limitations and drawbacks of the 2G, 3G and 4G networks and also reduced
the rate of security threats and risks. Mainly, 5G technologies use various kinds of security techniques
including cross-layer security, end to end security and encryption technique for reducing the
unauthentic signals from the systems.
Figure: Comparison of cellular networks

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORKING 4
(Source: Hossain, 2013)
Architecture of 5G
The architecture of 5G networks is highly advanced and its network factors and components are
upgraded to reduce errors and more complex situations. The 5G network system comprises the main
user terminal and connects two or more servers with the base networks using connecting wires. Each of
the radio technologies is evaluated as the IP link for the outside internet world [8]. The IP technology is
mainly developed to ensure sufficient manage data in an effective manner and the entire system work
on the CDMA multiplexing technique by which the performance of networks can be increased
effectively.
The 5G architecture has significant impacts on the mobile networks and systems which involve various
kinds of communication networks and servers for performing communication between two or more
networks in the systems [9]. A core network is connected with the servers that control and manage
communications between the transmitter and receiver systems and also provide a platform by which the
users can perform data transmission related activities in an appropriate. Therefore, it is reported that in
the area of wireless communication 5G architecture is able to manage the communication between the
two or more computing devices and also reduce security-related issues effectively [15].
Document Page
NETWORKING 5
5G attacks on the access and core networks
There are various kinds of security attacks occur in 5G networks which are described below:
DDOS attack
It is a common issue faced by the consumers while using 5G networks and communication systems that
directly impacts on the access and core networks. a recent study identified that hackers perform DDOS
attack by sending traffic signals and data to the core networks with the help of botnet and malicious
tools. With the help of this attack, criminals can easily enter into the main server and collect all reliable
data [10].
Malware attack
It is another type of security attack occurs in the 5G networks due to lack of security and
misconfiguration of networks. In which the criminals send viruses to the networks that spread from one
server to another and reduce the overall performance of the 5G networks used by the consumers [11].
Man in the middle attack
It is a part of networking attacks that directly impact on the core networks and servers used in 5G
technology. Such kind of security attack occurs when a criminal inserts itself between the
communications of a client and a network [12]. There are various types of MITM attack including,
session hijacking, IP spoofing, replay and so on.
Limitations of 5G
It is identified that 5G is an advanced communication technology that uses core networks and servers
due to which conflict may occur in the systems that can help the criminals to gather personal details of
consumers. Security is another issue related to 5G network coverage that can reduce the performance
of communication networks and systems. Moreover, there are few other issues are also linked with 5G
for example, deployment, cost, device support, and limited frequency bands.
Recommendation/solution
It is recommended that the security of 5G networks can be reduced by addressing the issue of
unauthentic access and traffic signals occurred in the core networks. Moreover, the developers should
focus on the cost and deployment of 5G networks by including effective servers and devices [13]. The
device support issue can be solved by including 5G networks in the mobile devices and systems used by
Document Page
NETWORKING 6
the consumers. Therefore, it is stated that 5G is a modern technology which will focus on the privacy
and security of data in the future and avoid deployment-related issues [14].
Conclusion
It is concluded that 5G is one of the best network technologies rather than 2G, 3G and 4G that improved
network speed and security of data. This proposed research compared various network technologies
and also evaluated the architecture of 5G networks. It is identified that DDOS, malware both are
common security attacks occurred in the 5G networks which may produce data loss related issues in the
systems. Therefore, it is recommended that the users should use only secured networks and authentic
servers in order to reduce traffic and unwanted signals from the 5G networks and improve the privacy of
data.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORKING 7
References
[1]. A., Al-Dulaimi, S., Al-Rubaye, Q. Ni and, E., Sousa, “5G communications race: Pursuit of more
capacity triggers LTE in the unlicensed band," IEEE vehicular technology magazine, 10(1), pp.43-
51, 2015.
[2]. A., Gohil, H. Modi and, S.K., Patel, “5G technology of mobile communication: A survey,” In 2013
international conference on intelligent systems and signal processing (ISSP), 12(8), pp. 288-292,
2013.
[3]. H., Haas, “LiFi is a paradigm-shifting 5G technology,” Reviews in Physics, vol. 3, no. 7, pp.26-31,
2018.
[4]. S., Hossain, “5G wireless communication systems,” American Journal of Engineering Research
(AJER), vol. 2, no. 10, pp.344-353, 2013.
[5]. Y.C., Hu, M., Patel, D., Sabella, N. Sprecher and, V., Young, “Mobile edge computing—A key
technology towards 5G,” ETSI white paper, vol. 11, no. 11, pp.1-16, 2015.
[6]. S., Li, L. Da Xu and, S., Zhao, “5G Internet of Things: A survey,” Journal of Industrial Information
Integration, vol. 10, no. 6, pp.1-9, 2018.
[7]. L., Lu, Y., Chen, W., Guo, H., Yang, Y. Wu and, S., Xing, “Prototype for 5G new air interface
technology SCMA and performance evaluation,” China Communications, vol. 12, no. 6, pp.38-48,
2015.
[8]. X., Meng, J., Li, D. Zhou and, D., Yang, “5G technology requirements and related test
environments for evaluation,” China Communications, vol. 13, no. 2, pp.42-51, 2016.
[9]. R.N. Mitra and, D.P., Agrawal, “5G mobile technology: A survey,” ICT Express, vol. 1, no. 3,
pp.132-137, 2015.
[10]. S., Parkvall, E., Dahlman, A. Furuskar and, M., Frenne, “NR: The new 5G radio access
technology,” IEEE Communications Standards Magazine, vol. 1, no. 4, pp.24-30, 2017.
[11]. S., Patil, V. Patil and, P., Bhat, “A review on 5G technology,” International Journal of
Engineering and Innovative Technology (IJEIT), vol. 1, no. 1, pp.26-30, 2012.
[12]. L., Pierucci, “The quality of experience perspective toward 5G technology,” IEEE Wireless
Communications, vol. 22, no. 4, pp.10-16, 2015.
[13]. P., Sharma, “Evolution of mobile wireless communication networks-1G to 5G as well as
future prospective of next-generation communication network,” International Journal of
Computer Science and Mobile Computing, vol. 2, no. 8, pp.47-53, 2013.
Document Page
NETWORKING 8
[14]. S. Singh and, P., Singh, “Key concepts and network architecture for 5G mobile
technology,” International Journal of Scientific Research Engineering & Technology (IJSRET), IIMT
Engineering College, Meerut, India, vol. 1, no. 5, pp.165-170, 2012.
[15]. J., Thompson, X., Ge, H.C., Wu, R., Irmer, H., Jiang, G. Fettweis and, S., Alamouti, “5G
wireless communication systems: Prospects and challenges [Guest Editorial],” IEEE
Communications Magazine, vol. 52, no. 2, pp.62-64, 2014.
[16]. Y., Huo, X. Dong and, W., Xu, “5G cellular user equipment: From theory to practical
hardware design,” IEEE Access, vol. 5, no. 7, pp.13992-14010, 2017.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]