MN603 Wireless Networks and Security: Evaluation of the 5G Network

Verified

Added on  2022/09/14

|15
|3102
|14
Report
AI Summary
This report provides an evaluation of 5G network and security, comparing it with current wireless communication technologies. It highlights the importance of 5G, its architecture, and the various generations of mobile technology. The report also discusses potential 5G attacks, network coverage issues, and mitigation plans. It covers aspects such as modulation techniques, medium access control, network speed, bandwidth utilization, and security risks like data leakage and network spoofing. The analysis includes the architecture of 5G, emphasizing its IP model-based structure, network slicing, and the role of Mobile Cloud Engine (MCE). The report concludes by addressing network coverage challenges and proposing solutions. Desklib offers this document along with a wide array of study resources to support students.
Document Page
Running head: WIRELESS NETWORK AND SECURITY
WIRELESS NETWORK AND SECURITY: 5G
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction..........................................................................................................................2
5G’s Importance..................................................................................................................3
Mobile technology’s various generations............................................................................4
Architecture of 5G...............................................................................................................7
5G attacks............................................................................................................................9
Network Coverage Issues in 5G........................................................................................11
Conclusion.........................................................................................................................11
References..........................................................................................................................12
Document Page
2WIRELESS NETWORK AND SECURITY
Introduction
The introduction of network based on cellular connection increased in a gigantic manner
in recent era, the wireless generation of cellular connection (G) stands for representing the
network's development with comparison to the parameter of frequency, latency, data capacity,
technology and speed. The capacities varies with respect to the generation, and introduction of
newer technologies, innovative features and platform that is well developed. The generation that
came in the fifth for the technology of mobile is the latest revolution in the sector of
communication based on wireless and uses frequencies at very high level. The primary goal that
is followed by the connection that are used in this generation is to support the WWWW (wireless
wave that is spaded worldwide). The report aims to discuss about the fifth generation connection
of wireless mobile. The report also gives a description about the 5g's importance in wireless
sector. It also provides a brief description about 5g's market importance, the relative comparison
in between mobile technology throughout various generation, different type of attracts related to
5g as well as the problem of network that is faced by 5g network in practice. This report suggests
some mitigation plan to deal with the identified issues of the coverage of network.
Document Page
3WIRELESS NETWORK AND SECURITY
5G’s Importance
The aimed goal of introducing the wireless network of fight generation is to achieve the
rate of transition at a level of 20-30 Gbps, which is nearly equal to the 50X speed to that of $G
network [1]. From the side of consumer the 5G network is beneficial from numbers of sides.
Low latency
IOT devices could get supported
More capacity is experienced than that of 4G
Development of Coverage
Supports connection in a huge number in the sector of wireless.
About 100Mbps data gets provided.
Signaling efficiency development.
Support antenna system of Smart beam.
Low issue of outage [2]
Traffic fees is relatable cheaper.
Consumption of Low battery
Beneficial in designing the artificial Intelligence devices or tool[3]
5G tries to supply standard that is unified globally, which will support in
portability of service and mobility in global standard.
Provides personalization of service that means the networks of 5G or the related
stations is also able of providing services, which are independent of the
capabilities.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4WIRELESS NETWORK AND SECURITY
It tries to give provide download of greater speed than about 1Gbps in connection
of LAN as well as more than 500 Mbps for WAN that is observed as 40 times
more than the networks of 4G.
It offers bandwidth at higher level for which the coverage of network is too wide.
Thus, people consider this network in the aim of enhancing their capacity of working
using 5G network. This developed and enhanced networks generation will support people in
gathering information at any instance as well as also help the consumer in communicating
efficiently and seamlessly.
Mobile technology’s various generations
Spectrum of Communication
In the year of 1980's when the introduction of 1G network happened for the purpose of
communication. The parameter that varies in-between 2G and 1G network is basically the
signal's type. 2G use to use the digital signal ibn the place of analog one like 1G. 2G was able to
provide the consumer with the facility of massaging with the facility of calling like that of 1G.
Where, in the scenario of 3G it supported the facility of mobile. The LTE version got introduced
in the technology of wireless mobile in the name of 4G [5]. The application of 5g demands the
usage of innovative band, which are greater that 6GHz and extended to about 100GHz that uses
the sub millimeters and millimeters forms of wave.
Document Page
5WIRELESS NETWORK AND SECURITY
Techniques of Modulation
Modulation is basically a kind of phenomenon that is able to alter many or single
property of one waveform that is periodic in nature with comparison to a singular signal of
modulation that is compromised with few data, which is needed to get transmitted. In the year of
1990 the evolution of 2G took place to the standard of GSM. The techniques of modulation that
are used in the communication that happens digitally is the method of PSK (keying of phase
shift) [6]. In the scenario of 2g there is a usage of TDMA (multiple access depending upon time)
as well as ever generation that came next used CDMA (multiple access depending upon code) in
the implementation of 2G.
Mechanism Medium access control
MAC or control of Medium access is defined through the layer that has the capability of
handling the device's hardware, which helps in interacting with the medium of wireless
transmission. The type of common network the gets used in the 2G network is PSTN (telephonic
network that is public switched) and in the scenario of 3G the packet internet is used. 5G as well
as 4G implement the network type of internet core. 4G provides IP that are unified and also
provides a seamless mixture related to the broadband i.e. WLAN, LAN, WAN and PAN [7]. For
that of 5G it also provides IP that is unified as well as provides broad band's mixture like 4G i.e.
WLAN, LAN, WAN and PAN. The type of technology that was implemented in 2G is IS-95,
IMT-2000 is used by 3G, the technology of WCDMA and for 4G it helps in supporting WiMAX
technology and LTE while in 5G it supports the technology of VOLTE...
Network speed and bandwidth utilization
Document Page
6WIRELESS NETWORK AND SECURITY
Bandwidth is the primary factor in wireless mobile technology. It is the capacity of data
that can be transferred from one point to other in given interval of time. The network speed is
totally different with the bandwidth. The bandwidth used in 2G is 900 MHz and it utilized the
narrow band type. 3G has the bandwidth of 100 MHz and uses the Wide bandwidth type [8]. 4G
has the bandwidth of 100 MHz and utilizes the ultra - wide bandwidth type. 5g is supposed to
have a bandwidth of (1000 X BW) per unit area.
Network speed is the important factor from a customer perspective. Thus, the network
speed of 2G is 64 Kbps and 3G is between 144 Kbps to 2 Mbps [9]. The network speed is
developed in the fourth and fifth generation of the wireless communication industry where the
4G provides a network speed of 100 Mbps to 1Gbps while 5G provides a network speed of more
than 1Gbps.
Security techniques and risk
Various security issues related to the wireless mobile network technology are data
leakage, Unsecured Wi–Fi, Network Spoofing, Phishing attack, Spyware, broken cryptography
and improper session handling. Data leakage is one of the primary issues of the wireless mobile
network technology. This can be mitigated by giving permissions to a valid mobile application.
A Wi-Fi network can be vulnerable for some devices. It can extract all data from the connected
device. This can be mitigated by using the mobile data and avoiding connecting to an unaware
Wi-Fi connection. Network spoofing is set by the hackers by providing fake access points [10].
This is avoided by nit providing the credentials to an outsiders. This security technique can also
be used to stop or avoiding the phishing attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7WIRELESS NETWORK AND SECURITY
Architecture of 5G
The architecture of 5G is mainly developed for the elements of network and upgradation
of several terminal to deal with new and unknown situation. The dependency of the upgradation
varies with the cognitive technology of radio that is comprised of several factors that plays an
important role like temperature, weather, and facility of GPRS. The whole 5G's architecture is IP
model based.
Figure 1: Basic 5G model
(Source: [11])
The above figure displays that a system contains numerous independent and autonomous
radio access technologies. It also contains a core user terminal. Each and every technologies
mentioned in the figure is treated as an IP link which is provided to the clients or users of the
network. The primary aim of developing the IP packets is to ensure that the sufficient amount of
data is used for routing IP packets related to few applications available in the internet. Now the
avaialbale packets are used by a user by following few policies as shown in the following figure:
Document Page
8WIRELESS NETWORK AND SECURITY
Figure 2: 5G architecture
(Source: [12])
End to End slicing network is used to support many 5G services as well as it is treated as
the primary factor for the evolution of the 5G architecture. 5G architecture is made up of
numerous sites and a three layered DC. The mentioned sites can support three various mode of
base stations like micro, macro and Pico. These base stations use RAN time methods. Few
particular hardware and great knowledge regarding the computing is also required to run the
software in the system. The mentioned three structured DC includes computing resources and
external storage. The three structures of DC are namely, central office DC, regional DC and the
last structure is the base station DC [13]. Service requirements consists of many networks which
depicts numerous network topologies along with these topologies it also consists of a list of
Document Page
9WIRELESS NETWORK AND SECURITY
operations. The physical wireless mobile network technology helps to extract a single network
slice. This process of extraction lowers the network construction budget. A single network slice
represents some logical lsit which allows the user for customized service operations. Mobile
Cloud engine also known as MCE is the logical element of the primary management and
handling tool of CloudRAN. Cloud base SON (cSON) develop the network coverage or the
network capacity of any wireless mobile technology. This development is carried out by proper
implementation of slicing management [14]. Shift njeqar the local office otr the centrsal office
iof the DC are downloaded to provide latency to some 5G services.
5G attacks
The proposed 5G technology comprises of many vulnerable threats such as Wi – Fi
access points, Evil Twins, Man in the Middle attack and DDoS attacks. A hacker can easily
identify the data flow (modified or updated by the SDN controller). The identification of the data
flow can increase the risk of the DDoS attack for the user. In addition to the DDoS attack when a
user clicks or visit in some unaware sites or the application it can negatively impact him or her as
it increases the risk of data breach by spreading some malicious content such as havoc. The
havoc can be spread by the attacker in the network which can export all the contents of the user
and misuse all the gathered information.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10WIRELESS NETWORK AND SECURITY
Figure 3: 5G attacks
(Source: [15])
NFV part in the 5G architecture plays an important role in the wireless communication
technology. It also contains few security threats such as no – repudiation, authenticity, integrity
and confidentiality. Sufficient security is not provided to the users by the current NFV sections
of the 5G architecture. The main issue associated with this section is the usage of the dynamic
behaviour of the VNFs. This leads to the configuration errors in the system. Now this behaviors
Document Page
11WIRELESS NETWORK AND SECURITY
of the VNF can lead to many vulnerable attacks like DOS, spoofing and sniffing. In addition to
these attacks some other relevant attacks are hypervisor hijacking, side channel attacks and the
attacks related to the virtual machine migeation. Any usual accessibility criteria can increase the
threat for the user as it will allow the attacker to easily access the information of the client. In
general, the insider or some known people can also misuse those information by injecting some
malicious programs or codes in the network. The Mobile Edge Computing or MEC comprises of
many complementary technologies that interoperates in open ecosystem.
Network Coverage Issues in 5G
The main aim of 5G technology is to provide quality services to the customers. The
Network coverage can be due to the barriers and interferences. These issues can be solved by
removing the dense small cell, using the mm waveband and MIMO and beam forcing technique.
The removal of the dense small cell can develop the signal power. Handoff rate is decreased such
that hand over is increased and the user can get sufficient signal power by travelling from one
place to other.
Conclusion
Thus, We saw that evolution of the wireless mobile technology has evolved in a gigantic
manner in these few decades. However among all the generations, the fifth generation will
transfer the society from one phase to other as it will facilitate many services to the people. The
fifth generation will improve the living of the people. The main concern of the fifth generation is
to give good services to the users keeping the cost at the minimum level. Thus, it can be said that
the mentioned technology will be a successful move as it contains some special features like
connectivity speed, reliability and inexpensive rates.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]