Analysis of 5G Network Vulnerabilities and Attacks

Verified

Added on  2025/08/07

|14
|2556
|465
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Evaluation of 5G Network and
the Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction...................................................................................................................................3
Motivation..................................................................................................................................... 4
Comparison of the Cellular Networks............................................................................................5
5G Architecture............................................................................................................................. 7
Identification and Analysis of 5G Attacks.....................................................................................10
Identification and Analysis of 5G limitation in network coverage:..............................................12
Conclusion................................................................................................................................... 13
References................................................................................................................................... 14
2
Document Page
Introduction
In this research study, the knowledge about the 5G data network has been provided by the user in order
to implement the 5G technology in the world for the much higher speed data connectivity. The different
types of cellular networks have been described in the research study and also their difference has also
been stated. The whole working architecture has been described of the 5G networks in this research
study. The different vulnerabilities, as well as the types of attacks which should happen on the 5G
networks, are also been analyzed in this research study. The overall study states about the 5G networks.
3
Document Page
Motivation
The 5G networks are one of the fastest networks available in the world in order to achieve the highest
data speed in the minimal costs. The sped of the 5G communication networks is so much higher so the
user can download as well as upload many things much faster to the different users. The 5G data
networks also provide the low latency to the different users in order to initiate the interconnectivity of
the different users (1). The different features of the 5G networks are secure enough to that no other
person can access the data of the users so that the user can browse anything more securely using the 5G
data networks. The speed of the 5G network is so much higher in terms of using internet connectivity by
the users. That’s why the 5G networks have been used and needed.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Comparison of the Cellular Networks
The cellular networks are used in the data connectivity in order to perform there are different data
communication cellular networks in order to send and receive the different signals so that in order to
perform the network connectivity.
There are different types of Cellular Networks which are as follows:
Basis 1G 2G 3G 4G 5G
Communication
Spectrum The range of the
network is low.
The range of
the network
has been
fastened
The range of
the networks
is faster than
2G.
Faster range
than 3G
Fastest range of
the network for
the
communication
Modultion
Techniques The 1G networks
use cell sites for
the
communication
The 2G network
uses GSM
network
technology.
The 3g
technique
uses packet
switching
which makes it
much faster.
The 4G
networks use
the WiMAX
standards in the
communication
The 5G networks
are using the
PAPR peak to
average power
ratio technique.
Medium Access
Control
Mechanism
Downlink as well
as uplink medium
Same medium
but orthogonal
channel division
medium.
Adaptive MAC
technique has
been used.
MIMO-OFDM
Technique for
the medium
access Control
has been used.
Frame-based
MAC has been
used in 5G
networks.
Network speed
and bandwidth
utilization
It offers 2.4 Kbps
speed in the
It offers 64
Kbps speed.
It offers 144
Kbps- 2Mbps
It offers 100
Mbps.
It will come with
the 100 gigabits
5
Document Page
bandwidth and
Network speed.
per seconds
which is 10 times
faster than 4G.
Security
techniques and
risk
No security
technique has
been used so the
network is having
different risk
factors.
The CDMA
technique has
been used in
the security of
the 2G
networks. But
the attacks can
be easily
performed
because of the
network
vulnerability
(2).
Network
security layers
such as
TLS/WTLS/SSL
has been
used. But is
not much
secure and
data can be
easily
accessed.
It uses the IP
based security
technique in
order to secure
the network.
The different
types of DoS
attacks are
possible on this
network.
The security
techniques such
as
authentication,
confidentiality,
availability, as
well as integrity.
The Major risk in
the networks
arises due to the
MITM attacks.
6
Document Page
5G Architecture
Diagram source (5)
5G Terminal: The 5G terminal is the overall manager as well as the controller of the 5G system
which states that the overall operations of the 5G terminal have been performed by using the
terminal. This terminal is known as the server which is the overall administrator of the particular
5G network which ensures the high -speed network connectivity in order to perform the data
transmission in the high speed of 100 gigabits per second (2).
GPRS/EDGE: the GPRS/EDGE uses the general packet radio service GPRS networks which consist
of the different packets of the dt that’ why it is known as the packet-oriented service. This
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
technique is mostly used in the 2G and 3G network service which is effective and efficient
enough in sending and receiving the data in the form of the packets.
3G: this is the third- generation network which leads to the use of the GPRS technology which
states that the high speed should be achieved in order to provide the high- speed cellular
networks to the users. The third- generation network has been using the particular technical
standards IMT-2000 which consists of much more reliability as well as the higher speed of the
data traveling.
WLAN: Wireless Local Area Network is known as the WLAN. This network consists of the two or
more devices which are connected with the wireless network in order to be the connection
source of the particular local area. This may lead to the establishment of the particular
connectivity among the different networks of the users so that the users might send and receive
the data through the network source (5).
LTE: The LTE stands for the Long- term Evaluation which leads to the evolution of the highest
speed 4G network. The LTE is the technology which has been used in 5G networks also so that in
order to get the 10 times more- faster speed than the 4G network. The LTE is the service which
provides the speed up to 100 MBPS to the different users in order to perform the particular
networking tasks (5).
Streaming server: the 5g data network is having the different types of the server which consists
of the streaming of the voice in order to perform the audio as well as the video streaming on the
screen of the user which provides them the highest speed for the streaming of the video in
order to perform the high speed audio and video streaming on the connected computer.
Data Server: the data server is the server which provides the transferring of the data from one
place to another in order to perform the data transfer form the user to user in order to send and
receive the data. The user might have different standards of sending as well as receiving the
data over the internet. The data server provides access to the different users for the data in
order to send or receive the data among the different users.
8
Document Page
Real-time communication server: The real-time communication server is the server which has
been allotted to the user for performing the communication with each other in order to perform
the data communication. The wireless communication network, as well as the different
networks, depending on the real-time communication server in order to perform the
communication process among the different people.
Control system policy server: the control system server is used in order to establish the
connectivity from the particular server which is efficient enough for the circulation of the
cellular networks. This server controls the overall communication as well as the control system
policies which should be made for the effective and efficient data transferring as well as the
communication process. These servers are efficient enough in taking control over the different
policies which are been made by the servers.
The components of the network architecture of the 5g data networks have been explained above in
order to explain the 5G network architecture. The 5G network consists of the most- highest speed
networks which are generating the speed of up to 100 gigabits per second in order to perform the
particular tasks. The fifth generation of the cellular network is much more efficient enough which may
lead to the fastest network connection which is having the technologies used in all the different types of
available communication networks (4). The signals in the G data networks has been transmitted by the
different users in the wireless network devices in order to provide the highest speed using the latest
technology in order to perform the different network-based tasks.
9
Document Page
Identification and Analysis of 5G Attacks
The 5G technology rather than having the latest as well as the fastest speed network it is much more
vulnerable in order to perform the different tasks on the network with the fastest speed of up to 100
gigabits per second which is 10 times more- faster than the computer networks. The vulnerability
presented in the 5G networks consists of the different terminologies which may have the different risks
caused due to the attacks. The attacks are performed by the different attackers in order to access the
data which are been sent and received by the different users so that the data has been leaked as well
misused which may consist of the different types of the data whether it is organizational or the
confidential or personal data of the user (4).
The different types of attacks on the 5G networks are:
Torpedo Attacks: the torpedo attacks are the type of the attacks which should be performed by
the hackers on the different communication networks which in terms allow the hackers to
access the files which are been transmitted over the networks which may lead to the
manipulation of the particular information. The attackers manipulate the different information
which is been available on the networks of the different users. this may lead to the information
loss of the user. The user might transmit the information over the networks and the attackers
access their private as well as the confidential information by attacking the network server to
access the private and confidential information and manipulate the information of the different
users (4).
IMSI attacks: the IMSI attacks are the most heavier attacks which are been made by the
different users in order to perform the increased traffic this has been done by the hackers by
sending the multiple messages to the server at a particular time in order to perform blockage or
congestion on the data routes so that the users might not be able to send and receive the
particular information in order to perform the IMSI attack the attackers might access the
network of the computer so that the multiple messages should be sent on the server in order to
bock the server route.
The PIERCER attacks: the PIERCE stands for the persistent information exposure by the CORE
Networks in order to perform the attack which may leak the phone number of the particular
user who is going to be attacked so that the users might be attacked and all their personal
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
information has been accessed by the attackers in order to access all the available information
of the users in order to leak the information and modify the particular information so this may
lead to a bigger problem in the secrecy of the private information of the users. the attackers
might insert the IMSI with the phone numbers of the user who are been attacked by the
attackers (4).
DDoS attacks: The Distributed denial of services attacks has been performed in the 5G networks
which may lead to the target- based attacks on the servers as well as the compromised
computer attacks. The attackers simply target the servers which are presented in the 5G
networks which may lead to the denial of the services by the servers. The server denies the
request of the different users in order to perform the attack on the server the attackers have the
access to the different types of the information which are been available on the network servers
so that the users might perform the transmission which is accessed by the attackers.
11
Document Page
Identification and Analysis of 5G limitation in network coverage:
The 5G networks instead of having the advantages there are some of the disadvantages also of the 5G
networks which are given as follows:
Less coverage: this id the largest limitation which has been happened in the 5G network
coverage which happened due to the bandwidth requirement of the network. The 5G network
doesn’t require the bandwidth in such a high quantity but the supply of the bandwidth is much
higher due to the higher supply the less coverage of the network is happened (6).
Radio frequency problem: the radio frequency may cause the problem in the 5G networks. The
users might provide the information in the range of 6GHZ which has now not been possible due
to the heavy traffic on the radio frequency range because of the larger amount of the users (6).
Costly: the 5G technology is the much more costlier network among the all of the available
network because it provides the highest speed of the data communication to the users in order
to provide the high speed it may charge a lot of money to the users which is a greater
disadvantage of the technology which is not affordable by any one (6).
Security: Since 5G technology has not been launched the research is in progress for the
development of the 5G technology so it is not as much secure as it has been needed by the
different users in order to perform the different networking tasks as well as the data
communication (6).
Maintenance: due to a large number of the technology inserted the maintenance cost of the 5G
technology is also much higher the different experienced engineers, as well as the new
technology, is required in order to maintain the technology (6).
12
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]