Comprehensive Report: Security Issues and Challenges in 5G Networks

Verified

Added on  2021/06/14

|5
|1162
|28
Report
AI Summary
This report provides a comprehensive overview of the security challenges associated with the fifth-generation (5G) wireless network technology. It explores various aspects of 5G security, including authentication, network architecture, and encryption, and addresses potential vulnerabilities such as Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks. The report also examines the importance of patch management and risk management strategies to mitigate security breaches. Furthermore, it highlights the significance of privacy protection in 5G networks, considering the potential for privacy leakage due to the collection of personal data. The report emphasizes the need for robust security measures to safeguard 5G systems and protect user data, presenting a detailed analysis of the evolving security landscape in the context of 5G technology.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
A REPORT
ON
SECURITY ISSUES IN 5G
NETWORK
STUDENT NAME-
SUBJECT NAME-
PROFESSOR NAME-
SUBMISSION DATE-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BACKGROUND
5G refers to Fifth Generation latest wireless technology which promises great speed and highly
responsiveness of wireless networks. 5G technology is based on IEEE 802.11ac standard. With this
technology, transmission of data can be up to 20gbps surpassing other current network speeds and
also offer latency of 1 ms or lower for utilizes that require continuous feedback. 5G will likewise
empower a sharp increment in the measure of information transmitted over remote frameworks
because of more accessible data transfer capacity and propelled antenna technology. In this report,
we discussed new security issues of the fifth generation (5G) remote system and gadget security. [1]
Security issues in 5G network
The burgeoning 5G technology will provide wide range of services, all of which will demand new
level of security. New 5G advancements will prompt new security issues. In the 5G time, security
advancements for systems and gadgets will be an essential worry of administrators, specialist co-
ops, and end clients. The administration driven engineering of 5G organize cuts will expect end-to-
end security assurance, including virtual security in NFV and SDN. Heterogeneous access systems will
require bound together validation engineering to rearrange client get simply access to system. As
colossal measures of information will be utilized as a part of the 5G period, encryption and
disengagement innovations will be expected to secure individual information. [2]
[3]
Document Page
Some security issues which are taken into consideration:-
Authentication -Saving the classification and uprightness of systems, frameworks, and
information relies upon constraining access to approved clients. This is ordinarily proficient
through viable, and now and again common, authentication. Shared validation for the most
part requires that the two substances associated with an exchange check each other's
personality in the meantime.
Network architecture - Security can't be worked for 5G administrations unless the system
foundation is strong. In inheritance systems, security of capacity arranges components (NEs)
depend to a great extent on how well their physical elements could be secluded from each
other. Be that as it may, in 5G, the seclusion will work distinctively as virtual NEs on cloud-
based framework. It's feasible that time is all in all correct to think about 5G framework
security. In view of system virtualization innovation, a system could manufacture distinctive
virtual system cuts. Each virtual system cut could oblige a specific administration necessity
and accordingly may require separated security abilities. 5G security configuration may
require considering issues of how to disconnect, deploy, and oversee virtual system cuts
safely.
Encryption – Encryption is a critical part of securing classification, honesty and accessibility in
correspondences situations. The NOI looks for input on the arranged organization and
utilization of encryption to advance 5G security, and in addition on the apparent difficulties,
expenses, and advantages of encryption at both the system and gadget levels. [3]
Shielding 5G Systems from DOS and DDOS Assaults - A security abuse that objectives
organize assets, for example, a Refusal of-Administration (DoS) or Conveyed Disavowal of
Administration (DDoS) assault, could affect accessibility of administration by causing an
aggregate or halfway disturbance of administration.
Fix Administration - For over 10 years, correspondences security specialists and master
bodies, for example, Government Warning Advisory group for interchanges looks for input
and supporting information on fix administration's part as a feature of a specialist co-op's
general security hazard administration technique in the 5G condition. [4]
Risk Management includes part arrange components into particular segments to help detach
security breaks and limit general hazard. Hazard division or system cutting may permit more
prominent versatility, more compelling digital risk checking and investigation and more
grounded security for organize benefit supporting basic framework correspondences (to
incorporate ICS and SCADA).
Document Page
Heterogeneous will be one of the system highlights of cutting edge get to systems. The
heterogeneous nature comes not just from the utilization of various access innovations (WiFi
and LTE), yet additionally from multi-organize condition, which may suggest that the
entrance arrange design from various systems are unique. So a thought for security
originators is building security engineering appropriate for various access innovations. IoT
gadgets have numerous options in the way they get to systems. For example, they may
associate with systems specifically, or by means of a portal, or then again in the D2D or
Transfer form. Contrasting with versatile handset, security administration of IOT gadget in
5G might be effective and lightweight with a specific end goal to set up confide seeing
someone amongst gadgets and systems.
Privacy Protection - As open network platforms, 5G networks raise serious concerns on
privacy leakage. In many cases, privacy leakage can cause serious consequences. As primary
method for network accessing, mobile networks carries data and signalling that contains
many personal privacy information (for instance, identity, position, and private content). In
order to offer differentiated quality of service, networks may need to sense what type of
service a user is using. The service type sensing may involve user privacy. Add all this
together; privacy protection in 5G is more challenging. [5]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1] M.Rouse,(2018, April. 26). Wireless technologies. [Online]. Available:
https://searchnetworking.techtarget.com/definition/5G. [Accessed: 06 May, 2018].
[2] Hidano S., Pečovský M., Kiyomoto S. (2016) New Security Challenges in the 5G Network. In: Li
K., Li J., Liu Y., Castiglione A. (eds) Computational Intelligence and Intelligent Systems.
Communications in Computer and Information Science, vol 575. Springer, Singapore
[3] Sdx central, (2018). What Are the Top 5G Security Challenges?. [Online].
Available:https://www.sdxcentral.com/5g/definitions/top-5g-security-challenges/. [Accessed: 06
May, 2018].
[4] Federal Communications Commission, (2017, Jan. 23). Fifth Generation Wireless Network
and Device Security. [Online]. Available:
https://www.federalregister.gov/documents/2017/01/23/2017-01325/fifth-generation-wireless-
network-and-device-security. [Accessed: 06 May, 2018].
[5] Huwai.com, (2018). 5G Security: Forward Thinking Huawei White Paper. [Online]. Available:
http://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf. [Accessed: 06 May,
2018].
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]