Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»5G Technology»Everything you need to know for a secure network
5G Technology

Everything you need to know for a secure network

5gantennas.orgBy 5gantennas.orgJanuary 5, 2024No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


With the growth of IoT devices and consumer smart gadgets, the world is pushing 4G networks to their limits. 5G not only offers faster speeds and higher capacity than previous cellular generations, it also offers improved security and privacy. 5G is essentially an evolution of his 4G security controls with new security protocols that address existing vulnerabilities.

This article describes the security architecture of 5G, how it differs from 4G, and the benefits and security challenges it brings.

5G security architecture

The 5G core network provides coordination between different parts of the access network and connectivity to the internet, and is a service-based architecture (SBA) built around cloud-based technologies, including authentication, security, session management, etc. provides the functionality of And the service.

SBA relies heavily on network function virtualization, which separates network functions into modular services and virtualizes network services that traditionally run on proprietary hardware. These are deployed using multi-access edge computing. Multi-access edge computing is a network architecture that places cloud computing and storage capabilities closer to users at the edge of the network.

Despite these changes, there is still a clear modular separation between the Radio Access Network (RAN) that provides wireless connectivity and the core security protocols.

Although 5G inherits much of the network security architecture of 4G, the 5G standard differs from previous standards in adopting security as a key design principle. For example, vendors and mobile carriers are required to comply with the requirements of the GSM Association Network Equipment Security Assurance Scheme. However, 5G, like 4G, will replace traditional network infrastructure because many new services and 5G technologies rely on virtualization, replacing specialized hardware with software-defined systems that work at the network edge. You can’t rely on security.

Therefore, 5G requires and supports more specialized security protocols and features to address the challenges of a significantly expanded attack surface and significantly increased use cases.

5G security features

With 5G, some of the most important security improvements are:

encryption

Stronger 256-bit encryption algorithms and separation of security keys between core networks provide better data protection and aim to make communications highly resistant to attacks by quantum computers .

privacy

In addition to strong encryption, the confidentiality and integrity of all data passing through the 5G network is protected, improving data privacy. Threats such as International Mobile Subscriber ID and Temporary Mobile Subscriber ID catchers allow 2G, 3G, and 4G networks to transmit a user’s permanent or temporary identifier in clear text during the device’s initial connection to the network. exploiting the fact that 5G networks make it impossible. .

5G security specifications do not allow plaintext transmission of Subscription Permanent Identifier (SUPI). Instead, 5G devices never transmit their real identity, but rather a privacy-preserving identifier containing a concealed SUPI called Subscriber Concealed Identity. This ensures that the identity and location of a user or device is encrypted, making it impossible to identify or locate them from the moment they join the network.

In addition to control plane integrity checks, 5G also adds additional checks to the user plane, which carries network user traffic between devices and the RAN. This ensures that messages between the device and applications on the user plane cannot be intercepted or modified over the air.

Authentication and authorization

5G has an authentication protocol called 5G Authentication and Key Agreement that uses asymmetric randomized cryptography to verify the identity of users, devices, and network elements. Its access and mobility management function sends the authentication request to the authentication server function, which forwards the authentication request to the unified data management and determines the appropriate authentication method depending on the subscriber profile. Although 4G supports pre-shared keys, certificates, and tokens, 4G requires a physical SIM card, which is not practical for simple IoT devices that rely on embedded SIMs.

roaming security

All communications between core network nodes use the same set of protocols protected by the same security controls, reducing the number of security processes. Security Edge Protection Proxy (SEPP) also implements end-to-end security protection for source and destination network traffic. SEPP replaces Signaling System 7 and Diameter used in 3G and 4G networks.

reliability

Network slicing, similar to traditional network segmentation, allows different segments to have security controls customized for specific use cases. Additionally, if an incident occurs, traffic can be immediately blocked or isolated if it is on a different network slice.

5G security benefits

5G introduces much-needed improvements to 4G network security with more frequent authentication and integrity checks. The fact that data can be transferred at high speeds using strong encryption complemented by authentication means that smart automation, better critical infrastructure monitoring, and smart cities are real possibilities.

The 5G standards incorporate input and expertise from around the world, and security is at the heart of it. With security controls built in at the design stage, 5G networks should be more resilient to current and future attacks.

5G security challenges

These benefits come at a price, as 5G deployments are expensive. For example, more transmitters are required to cover the same area as a 4G network, and security best practices increase costs. 5G will require strong enforcement by governments and compliance regulators such as the Federal Communications Commission to crack down on the omission of essential security features to reduce costs, which has led to security issues in many previous-generation networks. It has weakened it.

5G deployment relies on global supply chains, providing many opportunities for hackers to compromise hardware, software, and services. In fact, it will be several years before 5G networks that do not use legacy technologies become a reality. Until then, 5G must remain interoperable with his 3G and 4G. This means that downgrade attacks are a threat where hackers manipulate your connection to use a less secure 3G or 4G service.

There is a shortage of security professionals with deep knowledge of 5G security. While it is clear that vendors need to correctly implement the security controls required by the relevant standards, the greater risk is that mobile network operators actually deploying 5G will have to implement new or that it may introduce unforeseen risks or vulnerabilities. Unable to configure system correctly.

5G infrastructure is much more complex than 4G, with millions of connected devices, more traffic routing points, and a wider range of entry points, significantly increasing the attack surface. Monitoring and maintenance must be upgraded to maintain real-time threat detection. Otherwise, one malicious device could compromise thousands of nearby interconnected devices.

5G will expand connected services and industries with innovative use cases that could attract a new wave of cybercrime and threat vectors that will test the resiliency of 5G networks and the strength of controls that provide security for 5G communications. We support the creation of Many of these risks and security threats are still not fully understood. As a result, the Third Generation Partnership Project and other organizations involved in setting security standards for mobile technologies will ensure that the latest requirements are implemented based on the changing threat landscape and future risk assessments. is needed.

Bar chart of key security concerns for 5G networks
Find out the top concerns about enterprise 5G network security.

5G security due diligence

5G is beginning to change the landscape of the connected world we live in, becoming central to countless mission-critical processes and activities. This is why 5G security is a topic of discussion at both government and industry levels. In the world. Once fully deployed, 5G will significantly improve security compared to comparable 4G services, as long as it is deployed with end-to-end monitoring of system architectures, services, and devices in accordance with best practices and relevant standards. Masu.

Due diligence is essential for organizations looking to harness the power of 5G. Review your carrier and provider’s security practices to thoroughly understand what equipment they use and how it is deployed so that your internal security team can understand how devices connect and how sensitive data travels through 5G networks. Understand what data is sent, received, and stored.

Additionally, 5G security only covers the network, not the devices that businesses connect to the network. Therefore, it remains important to carefully select and purchase 5G-enabled devices to avoid the risks of low-end IoT devices with little built-in security.

Michael Cobb (CISSP-ISSAP) is a well-known security author with over 20 years of experience in the IT industry.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article5G Americas 2024 Leadership Team Announced
Next Article 802.11ah Wi-Fi HaLOW: 1 kilometer WiFi standard
5gantennas.org
  • Website

Related Posts

Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

August 28, 2024

URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

August 23, 2024

Smart Launches Smart ZTE Blade A75 5G » YugaTech

August 22, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

IDTechEx discusses driving the integration of antenna packaging technology for 5G and 6G

By 5gantennas.orgFebruary 27, 2024

boston, February 27, 2024 /PRNewswire/ — Once limited to military, satellite, and automotive radar applications,…

China’s important role in 6G

March 4, 2024

Golden Band and the Future of 6G (Leader Forum)

February 19, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

What can 5G do for packaging production?

November 29, 2023

5G could cause problems for US airlines, here’s why

June 28, 2023

Nokia and stc conduct O-RAN based 5G private wireless network trials

March 11, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.