Evaluation of 5G Wireless Network and Security: MN603 Report
VerifiedAdded on 2022/09/16
|11
|2428
|30
Report
AI Summary
This report offers a comprehensive evaluation of 5G wireless network technology. It begins by comparing 5G to previous generations (4G, 3G, and 2G), examining communication spectrum, modulation techniques, medium access control, network speed, bandwidth utilization, and security techniques. The report then delves into the architecture of 5G networks, including Nano core, aggregators, and IP networks. A significant portion of the report is dedicated to identifying and analyzing potential 5G attacks on access and core networks, such as denial-of-service attacks and man-in-the-middle attacks. Furthermore, the report addresses issues related to 5G network coverage, including dense small cell deployment, millimeter-wave frequency band challenges, and massive MIMO, offering potential solutions to mitigate these limitations. The report concludes with a synthesis of the findings and a discussion of the future of 5G technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: WIRELESS NETWORK AND SECURITY: 5G
WIRELESS NETWORK AND SECURITY: 5G
Name of the Student
Name of the University
Author Note
WIRELESS NETWORK AND SECURITY: 5G
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
WIRELESS NETWORK AND SECURITY: 5G
Table of Contents
Introduction......................................................................................................................................2
Motivation........................................................................................................................................2
Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G)in terms of........3
Explore the architecture of a 5Gnetwork.........................................................................................5
Identification of the 5Gattacks on the access and core networks....................................................6
Identification and solution of the issues of 5G................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
WIRELESS NETWORK AND SECURITY: 5G
Table of Contents
Introduction......................................................................................................................................2
Motivation........................................................................................................................................2
Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G)in terms of........3
Explore the architecture of a 5Gnetwork.........................................................................................5
Identification of the 5Gattacks on the access and core networks....................................................6
Identification and solution of the issues of 5G................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8

2
WIRELESS NETWORK AND SECURITY: 5G
Introduction
The emerging trend in the context of mobile network technology is the 5G technology
which has started to replace the technology of 4G by providing various factors that are very
advantageous in nature. Immigration to this particular technology are being planned by the
service providers of mobile because the technology can support a various devices that are
growing. The report focuses on the 5G generation technology. This report aims to compare the
various generations of cellular network in terms of modulation techniques, communication
spectrum, and mechanism of medium access control, security techniques, risk, and utilization of
bandwidth and network speed. The 5G network architecture will also be explored in this report.
The report also aims for the identification of the attacks that are related to 5G. It also aims for
identifying the various issues that are related to network coverage and finding the solution to
avoid the limitations that are faced.
Motivation
The industry is inspired by the successive growth in the approach for a better experience of the
broadband in order to match up to the future demands of the performance and the capacity. The
motivation of the this newest arrival in the field of technology of mobile network 5G is that it
provides various advantages like higher rate of data, reduced amount of latency, saves energy,
reduces cost, increased capacity of the system along with huge connectivity of the devices. In
simple words, the technology of 5G showcase three new and developed characteristics like much
significant speed for moving more amount of data, lower levels of latency for making it more
responsive in nature and the capability for connecting to a major number of devices that are
growing at the first attempt especially in case of the smart devices as well as sensors [1]. The 5G
WIRELESS NETWORK AND SECURITY: 5G
Introduction
The emerging trend in the context of mobile network technology is the 5G technology
which has started to replace the technology of 4G by providing various factors that are very
advantageous in nature. Immigration to this particular technology are being planned by the
service providers of mobile because the technology can support a various devices that are
growing. The report focuses on the 5G generation technology. This report aims to compare the
various generations of cellular network in terms of modulation techniques, communication
spectrum, and mechanism of medium access control, security techniques, risk, and utilization of
bandwidth and network speed. The 5G network architecture will also be explored in this report.
The report also aims for the identification of the attacks that are related to 5G. It also aims for
identifying the various issues that are related to network coverage and finding the solution to
avoid the limitations that are faced.
Motivation
The industry is inspired by the successive growth in the approach for a better experience of the
broadband in order to match up to the future demands of the performance and the capacity. The
motivation of the this newest arrival in the field of technology of mobile network 5G is that it
provides various advantages like higher rate of data, reduced amount of latency, saves energy,
reduces cost, increased capacity of the system along with huge connectivity of the devices. In
simple words, the technology of 5G showcase three new and developed characteristics like much
significant speed for moving more amount of data, lower levels of latency for making it more
responsive in nature and the capability for connecting to a major number of devices that are
growing at the first attempt especially in case of the smart devices as well as sensors [1]. The 5G

3
WIRELESS NETWORK AND SECURITY: 5G
network technology consists of the possibilities that are required for enabling all the various
industries, applications, models required in business that are fundamentally emerging in nature.
Comparison of the existing cellular networks generations (5G, 4G, 3G, and
2G)in terms of
Communication spectrum
Only calling was allowed in case of 1G whereas the feature of messaging the texts was
supported by 2G. The facilities of mobile were supported by the 3G technology. The version of
LTE was introduced by 4G in the technology of the wireless mobile [2]. The application of 5G
will require the utilization of unconventional bands with a value greater than the range between
6Hz to 100Hz by the utilization of sub millimeter as well as millimeter waveforms.
Modulation techniques:
The technique utilized in 2G is GSM which in turn utilizes a technique of modulation which
is known as Gaussian filtered Minimum Shift Keying. This is utilized in a various numbers of
systems that are used for communication which in turn utilizes the digital radio. The techniques
used in 3G are QAM and QPSK. This is utilized in Wi-F as well as WiMax and
HSDPA/WCDMA which are the wireless technologies. The signals that are modulated are
followed by demodulation at the end of the receiver the recovery of the authentic digital message
is done. The technique utilized by 4G is the frequency division multiplex. The modulation
scheme of orthogonal frequency division multiplex or OFDM is utilized by LTE which helps in
providing necessary spectral efficiency for achieving higher rates of data. The OFDM can be
utilized in 5g [3].
WIRELESS NETWORK AND SECURITY: 5G
network technology consists of the possibilities that are required for enabling all the various
industries, applications, models required in business that are fundamentally emerging in nature.
Comparison of the existing cellular networks generations (5G, 4G, 3G, and
2G)in terms of
Communication spectrum
Only calling was allowed in case of 1G whereas the feature of messaging the texts was
supported by 2G. The facilities of mobile were supported by the 3G technology. The version of
LTE was introduced by 4G in the technology of the wireless mobile [2]. The application of 5G
will require the utilization of unconventional bands with a value greater than the range between
6Hz to 100Hz by the utilization of sub millimeter as well as millimeter waveforms.
Modulation techniques:
The technique utilized in 2G is GSM which in turn utilizes a technique of modulation which
is known as Gaussian filtered Minimum Shift Keying. This is utilized in a various numbers of
systems that are used for communication which in turn utilizes the digital radio. The techniques
used in 3G are QAM and QPSK. This is utilized in Wi-F as well as WiMax and
HSDPA/WCDMA which are the wireless technologies. The signals that are modulated are
followed by demodulation at the end of the receiver the recovery of the authentic digital message
is done. The technique utilized by 4G is the frequency division multiplex. The modulation
scheme of orthogonal frequency division multiplex or OFDM is utilized by LTE which helps in
providing necessary spectral efficiency for achieving higher rates of data. The OFDM can be
utilized in 5g [3].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
WIRELESS NETWORK AND SECURITY: 5G
Medium access control mechanism
Medium Access Control is described as a surface which is responsible for handling the
hardware of any device which are accountable for the interactivity with the medium with
wireless transmission. The network utilized in 2G is the PSTN or Public Switched Telephonic
Network. The utilization of the packet internet is done in the field of 3G technology [4]. The core
kind of network of internet is utilized in 4G as well as 5G. Unified IP along with the mixture of
the broadband that is seamless in nature like LAN etc. is provided by 4g. Unified IP is also
provided by 5G. The mixture of broadband as that in 4G like WLAN is also provided by 5G. The
technology of GSM is used in 2G, WCDMA technology is used in 3G. LTE and Wimax
technologies are supported by 4G whereas VOLTE is supported by 5G [5].
Network speed and bandwidth utilization
The speed of network of 2G is 64kbps. The speed of network of 3G technology ranges
from 144kbps to 2mbps. The development of the network speed occurred in the fifth and fourth
generations of technology of the industry of wireless communication wherein a network speed of
100mbps to 1gbps is provided by 4G and the network speed of more than that of 1gbps is
provided by 5G [6].
The bandwidth utilized in 2G technology is 900 MHz which uses the narrow band ones.
The bandwidth that is utilized in 3G is 100MHz that makes use of wide bandwidth. The
bandwidth that 4G contains is 100 MHz which makes usage of the ultra-wide bandwidth. The
bandwidth which is supposed to be utilized in case of 5G should be (BandWidth * 1000) per unit
area.
WIRELESS NETWORK AND SECURITY: 5G
Medium access control mechanism
Medium Access Control is described as a surface which is responsible for handling the
hardware of any device which are accountable for the interactivity with the medium with
wireless transmission. The network utilized in 2G is the PSTN or Public Switched Telephonic
Network. The utilization of the packet internet is done in the field of 3G technology [4]. The core
kind of network of internet is utilized in 4G as well as 5G. Unified IP along with the mixture of
the broadband that is seamless in nature like LAN etc. is provided by 4g. Unified IP is also
provided by 5G. The mixture of broadband as that in 4G like WLAN is also provided by 5G. The
technology of GSM is used in 2G, WCDMA technology is used in 3G. LTE and Wimax
technologies are supported by 4G whereas VOLTE is supported by 5G [5].
Network speed and bandwidth utilization
The speed of network of 2G is 64kbps. The speed of network of 3G technology ranges
from 144kbps to 2mbps. The development of the network speed occurred in the fifth and fourth
generations of technology of the industry of wireless communication wherein a network speed of
100mbps to 1gbps is provided by 4G and the network speed of more than that of 1gbps is
provided by 5G [6].
The bandwidth utilized in 2G technology is 900 MHz which uses the narrow band ones.
The bandwidth that is utilized in 3G is 100MHz that makes use of wide bandwidth. The
bandwidth that 4G contains is 100 MHz which makes usage of the ultra-wide bandwidth. The
bandwidth which is supposed to be utilized in case of 5G should be (BandWidth * 1000) per unit
area.

5
WIRELESS NETWORK AND SECURITY: 5G
Security techniques and risk
The different types of security issues that are interconnected to the technology of wireless
mobile network includes insecure Wi-Fi, network spoofing, leakage of data, spyware, attacks
that are related to phishing, improper handling of session etc. The issues regarding the leakage of
data can be avoided by permitting the mobile applications which are valid. The issues regarding
the insecure Wi-Fi can be avoided by only connecting to mobile data [7].
Explore the architecture of a 5Gnetwork
The architecture of the 5G network contains Nano core, aggregator, network of internet
protocol etc. The 5G system model is totally based on the model of IP which is designed for the
network that are mobile as well as wireless. That particular system comprises of a terminal which
is the main terminal of the user. It also consists of a various number of radio access technologies
that are independent as well as autonomous. Each and every radio technologies are assumed as
the links of IP for the world that is outside the internet. The technology of the internet protocol is
designed for ensuring sufficient amount of control of data for the IP packets routing to be
appropriate which is interconnected to the connections of selected application [8]. This means
that the sessions occurred between the servers and the applications of the clients are there over
the internet. All packets should be constantly fixed according to the policies that are given by the
user for making the routing much more accessible. The network of 5G makes usage of the
concept of flat internet protocol such that the various Radio Access Networks can make the
utilization of a single Nano core that are similar in nature for the communication to take place.
The radio access networks which are supported by the architecture of 5G includes GPRS, GSM,
LTE-advanced and many more. The architecture of flat IP is useful for the identification of the
WIRELESS NETWORK AND SECURITY: 5G
Security techniques and risk
The different types of security issues that are interconnected to the technology of wireless
mobile network includes insecure Wi-Fi, network spoofing, leakage of data, spyware, attacks
that are related to phishing, improper handling of session etc. The issues regarding the leakage of
data can be avoided by permitting the mobile applications which are valid. The issues regarding
the insecure Wi-Fi can be avoided by only connecting to mobile data [7].
Explore the architecture of a 5Gnetwork
The architecture of the 5G network contains Nano core, aggregator, network of internet
protocol etc. The 5G system model is totally based on the model of IP which is designed for the
network that are mobile as well as wireless. That particular system comprises of a terminal which
is the main terminal of the user. It also consists of a various number of radio access technologies
that are independent as well as autonomous. Each and every radio technologies are assumed as
the links of IP for the world that is outside the internet. The technology of the internet protocol is
designed for ensuring sufficient amount of control of data for the IP packets routing to be
appropriate which is interconnected to the connections of selected application [8]. This means
that the sessions occurred between the servers and the applications of the clients are there over
the internet. All packets should be constantly fixed according to the policies that are given by the
user for making the routing much more accessible. The network of 5G makes usage of the
concept of flat internet protocol such that the various Radio Access Networks can make the
utilization of a single Nano core that are similar in nature for the communication to take place.
The radio access networks which are supported by the architecture of 5G includes GPRS, GSM,
LTE-advanced and many more. The architecture of flat IP is useful for the identification of the

6
WIRELESS NETWORK AND SECURITY: 5G
devices that makes the utilization of the symbolic names as compared to that of the hierarchical
architecture where the normal addresses of IP are utilized [9]. A various number of elements of
the network are reduced by this particular architecture in the data path. All the traffics of RAN
are aggregated by the aggregator routed to the gateway.
Identification of the 5Gattacks on the access and core networks.
The 5G attacks on the core and access networks are traffic of flash network includes the
DOS or Denial of Service attacks on the devices of the end-user as well as on the infrastructure,
man in the middle attack, roaming security, signaling storms etc. The security challenges
regarding SDN are the rules present in the data elements of data forwarding are modified by
SDN. This traffic regarding the control information can be detected which makes it an entity in
that particular network which can be seen and hence is rendered [10].
The NFV is vulnerable to selected set of threats flooding attacks, side-channel attacks,
and injection of malware, hypervisor hijacking, and attacks related to the migration of the virtual
machine and the attacks which are cloud-specific in nature [11]. The deployments of NFV that
are private in nature has more vulnerability and moreover only to the insiders that are malicious
in nature like the administrators that are malicious in nature because of the prevention of the
access to the system. The interference of the VNF with the infrastructure operations occurs
because of the ways of accessing the physical resources of the infrastructure are common [12].
Identification and solution of the issues of 5G
The issues related to the coverage of the 5G network are:
WIRELESS NETWORK AND SECURITY: 5G
devices that makes the utilization of the symbolic names as compared to that of the hierarchical
architecture where the normal addresses of IP are utilized [9]. A various number of elements of
the network are reduced by this particular architecture in the data path. All the traffics of RAN
are aggregated by the aggregator routed to the gateway.
Identification of the 5Gattacks on the access and core networks.
The 5G attacks on the core and access networks are traffic of flash network includes the
DOS or Denial of Service attacks on the devices of the end-user as well as on the infrastructure,
man in the middle attack, roaming security, signaling storms etc. The security challenges
regarding SDN are the rules present in the data elements of data forwarding are modified by
SDN. This traffic regarding the control information can be detected which makes it an entity in
that particular network which can be seen and hence is rendered [10].
The NFV is vulnerable to selected set of threats flooding attacks, side-channel attacks,
and injection of malware, hypervisor hijacking, and attacks related to the migration of the virtual
machine and the attacks which are cloud-specific in nature [11]. The deployments of NFV that
are private in nature has more vulnerability and moreover only to the insiders that are malicious
in nature like the administrators that are malicious in nature because of the prevention of the
access to the system. The interference of the VNF with the infrastructure operations occurs
because of the ways of accessing the physical resources of the infrastructure are common [12].
Identification and solution of the issues of 5G
The issues related to the coverage of the 5G network are:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
WIRELESS NETWORK AND SECURITY: 5G
Dense small cell deployment:
The problem that exists here are increased rate of handoff. The continuous
movement of the users from the area of single cell coverage to another creates too many
numbers of handover [13]. To address the issue some steps can be taken like the rate of
handoff can be minimized in the future networks of 5G.
Millimeter-wave frequency band.
The millimeter-wave frequency becomes scarcer because it contains certain
number of characteristics that have a favorable propagation [14]. This scarcity can be
addressed by 5G by certain ways like when higher capacity of network along with the
connectivity and the additional spectrum is also required [15].
Massive MIMO and beamforming.
The challenge faced regarding this is the contamination of pilot from those cells
that are situated nearby due to the increment in the number of antennas. Due to this,
channel estimation has become a challenging issue. It can be avoided by pairing M-
MIMO with millimeter-wave band [16].
Conclusion
In this report, the comparison of the various generations is done with respect to the
communication spectrum, the techniques of modulation, and the mechanism of media access
control, utilization of bandwidth, speed of networks, security techniques and risks is done. The
architecture of the 5G network has been thoroughly discussed. The various attacks regarding the
WIRELESS NETWORK AND SECURITY: 5G
Dense small cell deployment:
The problem that exists here are increased rate of handoff. The continuous
movement of the users from the area of single cell coverage to another creates too many
numbers of handover [13]. To address the issue some steps can be taken like the rate of
handoff can be minimized in the future networks of 5G.
Millimeter-wave frequency band.
The millimeter-wave frequency becomes scarcer because it contains certain
number of characteristics that have a favorable propagation [14]. This scarcity can be
addressed by 5G by certain ways like when higher capacity of network along with the
connectivity and the additional spectrum is also required [15].
Massive MIMO and beamforming.
The challenge faced regarding this is the contamination of pilot from those cells
that are situated nearby due to the increment in the number of antennas. Due to this,
channel estimation has become a challenging issue. It can be avoided by pairing M-
MIMO with millimeter-wave band [16].
Conclusion
In this report, the comparison of the various generations is done with respect to the
communication spectrum, the techniques of modulation, and the mechanism of media access
control, utilization of bandwidth, speed of networks, security techniques and risks is done. The
architecture of the 5G network has been thoroughly discussed. The various attacks regarding the

8
WIRELESS NETWORK AND SECURITY: 5G
5G networks have also been identified and analyzed. The issues related to the coverage of the 5G
network have been identified and the solutions regarding the limitations have also been
presented.
WIRELESS NETWORK AND SECURITY: 5G
5G networks have also been identified and analyzed. The issues related to the coverage of the 5G
network have been identified and the solutions regarding the limitations have also been
presented.

9
WIRELESS NETWORK AND SECURITY: 5G
References
[1] Bangerter, B., Talwar, S., Arefi, R. and Stewart, K. Networks and devices for the 5G
era. IEEE Communications Magazine, 52(2), pp.90-96, 2014.
[2] Chen, S. and Zhao, J. The requirements, challenges, and technologies for 5G of terrestrial
mobile telecommunication. IEEE communications magazine, 52(5), pp.36-43, 2014.
[3] Chin, W.H., Fan, Z. and Haines, R. Emerging technologies and research challenges for 5G
wireless networks. IEEE Wireless Communications, 21(2), pp.106-112, 2014.
[4] Clarke, R.N. Expanding mobile wireless capacity: The challenges presented by technology
and economics. Telecommunications Policy, 38(8-9), pp.693-708, 2014.
[5] Delcamp, H. and Leiponen, A., Innovating standards through informal consortia: The case of
wireless telecommunications. International Journal of Industrial Organization, 36, pp.36-47,
2014.
[6] Fagbohun, O. Comparative studies on 3G, 4G and 5G wireless technology. IOSR Journal of
Electronics and Communication Engineering, 9(3), pp.88-94, 2014.
[7] Godara, L.C. ed. Handbook of antennas in wireless communications (Vol. 4). CRC press,
2018.
[8] Hudson, H.E. From rural village to global village: Telecommunications for development in
the information age. Routledge, 2013.
WIRELESS NETWORK AND SECURITY: 5G
References
[1] Bangerter, B., Talwar, S., Arefi, R. and Stewart, K. Networks and devices for the 5G
era. IEEE Communications Magazine, 52(2), pp.90-96, 2014.
[2] Chen, S. and Zhao, J. The requirements, challenges, and technologies for 5G of terrestrial
mobile telecommunication. IEEE communications magazine, 52(5), pp.36-43, 2014.
[3] Chin, W.H., Fan, Z. and Haines, R. Emerging technologies and research challenges for 5G
wireless networks. IEEE Wireless Communications, 21(2), pp.106-112, 2014.
[4] Clarke, R.N. Expanding mobile wireless capacity: The challenges presented by technology
and economics. Telecommunications Policy, 38(8-9), pp.693-708, 2014.
[5] Delcamp, H. and Leiponen, A., Innovating standards through informal consortia: The case of
wireless telecommunications. International Journal of Industrial Organization, 36, pp.36-47,
2014.
[6] Fagbohun, O. Comparative studies on 3G, 4G and 5G wireless technology. IOSR Journal of
Electronics and Communication Engineering, 9(3), pp.88-94, 2014.
[7] Godara, L.C. ed. Handbook of antennas in wireless communications (Vol. 4). CRC press,
2018.
[8] Hudson, H.E. From rural village to global village: Telecommunications for development in
the information age. Routledge, 2013.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
WIRELESS NETWORK AND SECURITY: 5G
[9] Li, J.L.W., Krairiksh, M., Rahman, T.A. and Al-Shamma'a, ADecember. Keynote speakers:
Wireless power transfer: From long-distance transmission to short-range charging. In 2013 IEEE
International RF and Microwave Conference (RFM) (pp. xi-xv). IEEE, 2013.
[10] Osseiran, A., Braun, V., Hidekazu, T., Marsch, P., Schotten, H., Tullberg, H. & Schellman,
M. (June). The foundation of the mobile and wireless communications system for 2020 and
beyond: Challenges, enablers and technology solutions. In 2013 IEEE 77th Vehicular
Technology Conference (VTC Spring) (pp. 1-5). IEEE, 2013.
[11] Pirinen, P. November. A brief overview of 5G research activities. In 1st International
Conference on 5G for Ubiquitous Connectivity (pp. 17-22). IEEE, 2014.
[12] Samdanis, K., Costa-Perez, X. and Sciancalepore, V. From network sharing to multi-
tenancy: The 5G network slice broker. IEEE Communications Magazine, 54(7), pp.32-39, 2016.
WIRELESS NETWORK AND SECURITY: 5G
[9] Li, J.L.W., Krairiksh, M., Rahman, T.A. and Al-Shamma'a, ADecember. Keynote speakers:
Wireless power transfer: From long-distance transmission to short-range charging. In 2013 IEEE
International RF and Microwave Conference (RFM) (pp. xi-xv). IEEE, 2013.
[10] Osseiran, A., Braun, V., Hidekazu, T., Marsch, P., Schotten, H., Tullberg, H. & Schellman,
M. (June). The foundation of the mobile and wireless communications system for 2020 and
beyond: Challenges, enablers and technology solutions. In 2013 IEEE 77th Vehicular
Technology Conference (VTC Spring) (pp. 1-5). IEEE, 2013.
[11] Pirinen, P. November. A brief overview of 5G research activities. In 1st International
Conference on 5G for Ubiquitous Connectivity (pp. 17-22). IEEE, 2014.
[12] Samdanis, K., Costa-Perez, X. and Sciancalepore, V. From network sharing to multi-
tenancy: The 5G network slice broker. IEEE Communications Magazine, 54(7), pp.32-39, 2016.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.