Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)

Security Threats and Challenges in


Future Mobile Wireless Networks
Shailesh Pramod Bendale Jayashree Rajesh Prasad
Computer Engineering Computer Engineering
NBN Sinhgad School of Engineering, Sinhgad College of Engineering,
Pune, India Pune, India
shailesh.bendale@sinhgad.edu jrprasad.scoe@sinhgad.edu

Abstract— With the introduction of 5G Mobile Wireless Heterogeneous Network (HetNet), mMIMO, millimeter
Networks there are many issues regarding security. The wave (mmwave) [8], D2D communication [7], M2M
comprehensive study of new 5G Mobile Wireless Network in Communication. General architecture of 5G Wireless
contrast with conventional cellular network (4G) is to be done. Systems is depicted in Fig. 1 [2]. 5G will not only provide
It begins with the particularities of 5G network and new conventional data and voice services. But there are some use
requirements as well as motivation of 5G Mobile Security. The
threats and security concerns are to be studied. The recent
cases for vehicle to vehicle communication, health
developments in existing scheme of 5G Mobile Network based applications, smart cities, industry atomization and so on.
on security services like Authentication of Devices, Availability These new technologies, new architecture, new applications
of network in a specified area, Confidentiality of Data, Privacy bring in the new security issues and need to resolve them.
and intrusion detection is to be summarized. 5G Mobile
Wireless Network has new security features because of many
new different technologies used in 5G such as Internet of
Things(IoT), massive multiple-input multiple- output
(mMIMO), device-to-device communications(D2D) and
software defined networks(SDN). Based on these security
development and research new 5G Mobile Wireless Securities
is explained. New Intrusion detection techniques also required
to be developed for the future mobile wireless network. Future
directions and scope in security management in 5G is then
summarized.

Keywords— Security in 5G, 5G Mobile Wireless Networks,


Intrusion detection System (IDS).

I. INTRODUCTION

The new generation of Mobile-Telecommunication System


Fig. 1. General Architecture of 5G Wireless System
is 5th Generation Wireless System (5G). It’s not just a next
version or advancement of current 4G Systems; it is much
There is requirement for the new intrusion detection
more beyond that. It will unlock new service capabilities
techniques for future mobile wireless network. Since the 5G
and implementation challenges for world. The utilization of
will consist of heterogeneous network [11]. The current
all the cellular networks till 2020 is going to be more than
50 billion; tremendous amount of increase in data traffic mechanisms will not be helpful to provide the security.
will be seen as compared to the current scenario [1]. Present
Present Wireless Communication has limited bandwidth and
cellular network (4G) will not be capable of or sufficient to
Broadcast nature of transmission, due to this it is possible but
handle these requirements, so there is a need of 5G Mobile
hard to provide security to the users. The current Wireless
Telecommunication. The major focus of the researchers will
Communication (4G) provides security based upon traditional
be focus on more capacity than 4G, dense network devices
security methodologies as user identity management and two-
as well as new services like Device to Device
way authentications in the User Equipment (UE) and Base
Communication (D2D)[7], massive Multiple Input Multiple
Station, securing communication channel, etc. The new
Output (mMIMO) and many more. More specifically, 5G
technologies have many requirements such as very less amount
advanced features aims at 1-10Gbps connections, 10-100x
of latency, reduced consumption of power in the
connected devices, almost 100% availability, 90% reduced
communication. These technologies not only need better
network power consumption and increased battery life up to
service capabilities but also are vulnerable to security attacks.
10 years for lower power consumption devices. To achieve
For e.g. In IoT many devices will not have
these goals other technologies are used in 5G are

978-1-5386-5201-5/18/$31.00 ©2018 IEEE 146


2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)

large computational power hence they can’t work on same


protocols as we are using for high end devices and hence
they will be vulnerable to threats.

Security attacks are divided mainly into two categories


Passive and Active Attacks [9]. Passive attacks are generally
made to make unauthorized use of information of the
authorized users and are not intended to interrupt the
communication. Most famous passive attacks are
Eavesdropping and Traffic Analysis. These attacks violets
the privacy of users and Data Confidentiality. On the other
hand, Active attacks are intended to interrupt the
communication of legitimate users or to alter the
communication. Active attack includes Distributed Denial (b) Jamming
0f Service (DDoS) Attack, Denial of Service (DoS) Attack
and Man in The Middle (MITM) Attack. To deal with these
attacks many approaches are being used. These approaches
can be categorized into two types, Cryptographic
Approaches and Physical Layer Security (PLS) Approaches.
Out of these two, Cryptographic approaches are
conventionally being used at different layers of 5G Wireless
network. Cryptographic approaches are considered into two
types, Asymmetric Key Cryptography and Symmetric Key
Cryptography. Symmetric Key Cryptography is referred to
method of sharing a private key between each pair of
communication parties for encryption and decryption. In
Asymmetric Key Cryptography, a private key is used to
(c) DoS and DDoS
decrypt the data and a public is used to encrypt the data. As
the name suggests public key is shared among the all parties
of network and each user will have his own private key. The
performance of the Cryptographic approaches totally
depends upon length of the key and complexity of
algorithm. But due to the low latency and reduced power
consumption requirements of 5G it will encounter problems
in Cryptographic approaches. PLS can play interesting role
here, it is proved that even if legitimate user uses worse
channel than eavesdropper, it is possible to generate secrete
key. There is lot of research done in 5G wireless network.
Comparing these two strategies PLS will have lower
computational complexity with larger scalability therefore
PLS is ideal technique for 5G Wireless Networks. (d) MITM
II. ATTACKS IN 5G NETWORK
Fig. 2. Attacks in 5G Network

Fig. 2 represents the attacks, each one of them is


individually elaborated in the two aspects, the attack, and
security approach [2].
A. Eavesdropping and Traffic Analysis: It’s Passive attack
as the network and communication is not interrupted. In this
attack, attacker intercepts the communication of two
legitimate users without their knowledge. Since it is passive
in nature this attack remains unnoticed. Encryption
technique is used to prevent these types of attacks; if a
message is encrypted eavesdropper can’t intercept it easily.
Traffic analysis attack is used to intercept data of location,
(a) Eavesdropping identity of the communicating parties and pattern of

147
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)

communication. Even if message is encrypted, traffic important to avoid previously mentioned attacks and
analyzer can still read the pattern of communication. This preserve user Privacy and Data Confidentiality. In 4G LTE,
attack also doesn’t affect communication or network. These authentication between devices and Base station is done
kind of attack violet Data Confidentiality and User Privacy. before the communication. The authentication present
cellular networks are done using symmetric key approach.
The strength of encryption algorithm plays the most
Whereas in 5G, is not only limited to UE and Base Station
important part to prevent these kinds of attacks, and if Eaves
but also between third party user.
dropper uses higher computational capacity devices than the
communication parties it will be easy to decrypt the B. Confidentiality: Data confidentiality and Privacy are the
message. Present, solution for eavesdropping assumes two types of confidentiality [2]. Data confidentiality helps to
eavesdropper will have lower computational power and less fight against Passive Attacks. Privacy stops unauthorized
data analysis capabilities. Moreover, some technologies users from analyzing or influencing data. The traffic
such as IoT and HetNet this may difficulty to tackle patterns are used to analyze information such as location or
eavesdropping which will lead to more complex scenarios. any sensitive information. This becomes a very sensitive in
Rather than Cryptography PLS techniques are paid more 5G where there will be much more personal data such as
attention in 5G to deal with these problems [9]. health applications, vehicle data etc.
Cryptographic approaches are most popularly used to
B. Jamming: Unlike previously discussed problem Jamming restrict the access from unauthorized users from any
can completely stop the communication between legitimate information to secure data confidentiality. Sender and
users. Jamming prevents legitimate users from receiver use Private Key encryption to encrypt and decrypt
communication and accessing radio resources. This is an data it is also called as symmetric key encryption. In this
Active type of attack and in active attacks solution is cryptography both should share the private key. For sharing
detection oriented. A resource allocation strategy can be the key, secure key distribution method is used. Previous
used to prevent these types of attacks to provide better error methods assume that attacker has less computing
rate performance and increase detection speed. As shown in capabilities and hardware. So those techniques don’t work
figure, malicious node interrupts the communication on attackers with high computing power. PLS can provide
between two authorized parties [9]. better option in these situations to fight with Jamming and
Eavesdropping attack.
C. DoS and DDoS: DoS are the most famous kind of attacks
used to take down the whole network. DoS or DDoS attacks C. Availability: Availability is checking how a service is
can completely exhaust network resources, by sending accessible and usable to a user from anywhere and anytime
malicious request. It is also an Active type of attack which [2]. It is also a degree to which a service is robust against
impacts availability of the network. DoS can be done from any type of attack. DoS and DDoS are the attacks which
more than one node which creates more adversaries for violets the availability of network. Jamming can also
network it is called as DDoS. In 5G Wireless Network with prevent communication between legitimate users by
higher density of devices DoS can attack various layers of interrupting communication links between them. With the
the Network and can become serious threat to the system. A increasing use of IoT nodes it will be very difficult to fight
DoS attack can use to attack nodes which can target on against Jamming and DoS kind of Attacks to maintain
Battery, Memory, Sensors, Radio or CPU [9]. availability of 5G wireless Network. Resource allocation
can become effective method to fight against these
D. MITM: In MITM, the control of the channel between problems.
users is taken by attacker. The attacker will replace, modify,
or totally changes the message to be passed between two D. Integrity: There is no mechanism to avoid duplication or
parties. Fig.2 shows MITM attack models. It is also active modification of message even if Message Authentication
attack which compromises Data Confidentiality, Integrity, provides confirmation of source of the message. 100%
and availability [9]. availability is the aim of 5G Wireless Networks to support
the applications close to human life such as health
III. SECURITY SERVICES monitoring, vehicle monitoring, etc. The important aspect of
New technology, new scenarios, new features in 5G Security in 5G is Integrity of data. Integrity restricts
wireless networks other possibilities and security concerns. message from being edited or copied by any attacker [2].
Here, we discuss five aspects of security services:
authentication, confidentiality, availability, integrity and E. Intrusion Detection: All the above mechanisms are used
intrusion detection. for prevention, but in today’s world security is of too much
concern [11]. If some attacker is successful in bypassing the
A. Authentication: Authentication can be categorized into prevention mechanism like authentication, etc. This
two types, Entity Authentication and Message scenarios is also equally important which need to be taken
Authentication [2]. These kinds of authentications are into consideration.

148
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)

IV. TECHNOLOGIES USED IN 5G which comes into picture when some malicious data comes
In this section, we present the different technologies which into the network bypassing the firewall. But if we consider
can be applied to 5G Wireless Networks. We will take a the case of future mobile wireless networks each node will
brief look at new possibilities and use cases in these new require the security mechanism. Each end user needs to be
technologies. equipped with intrusion detection mechanism due to
heterogeneous networks. So if the above prevention
A. HetNet: The best service to provide high coverage in 5G technique like authentication is misused then security is
is HetNet. HetNet has many heterogeneous characteristics essential. New or Existing IDS techniques or frameworks
and also provides high capacity, better coverage and best will be required [11].
performance in terms of Energy Efficiency (EE) and V. OBSERVATION AND EXISTING WORK
Spectrum Efficiency (SE). Despite these capabilities,
HetNet is more vulnerable in terms of User Equipment to There is a lot of work going on in 5G but standardization
Eavesdropping compared to single tier legacy Network. The process is at very early stage and there is a lot of scope for
HetNet consists of high density of small cells, and with new research in 5G, especially in security aspect. Being
continues handover of small cells, handover will suffer from very new and emerging technology there are several future
performance issues. [2] directions. Following table is for giving a rough idea about
B.D2D: D2D communication means Device can what can be done in order to make communication in 5G
communicate with another Device without going through reliable and secure than ever before. In this paper, we have
the Base Station. D2D communication allows the efficient elaborated very few methods; many new methods are
use of spectrum. Also, it helps in reducing load from Base coming in market. Lot of work is needed to be done to
Station. Dynamic Spectrum access is usually adopted to provide the security, especially in the field of intrusion
improve spectrum efficiency, but this leads to vulnerability detection techniques.
such as Jamming attack. Resource allocation via TABLE I DIFFERENT SERVICES AND APPROACHES IN 5G
cooperation between nodes of D2D is a most used way to Services Approaches
provide security to D2D communication. Besides Authentication SDN Enabled Entity Authentication, CRC based
cooperation, channel access and power control can also be message authentication[3]
used for securing D2D Communication [7]. Availability Pseudo Random Time Hopping [4], Fusion Center
based detection for low power Devices.[5]
Confidentiality Power Control, Artificial Noise with mmWave [6]
C. Massive MIMO: We can achieve high Energy Efficiency Intrusion New framework for Mobile cloud based Solution in
and Spectrum Efficiency for network by using large number detection 5G network [11].
of antennas. By using large number of antennas, we can
achieve huge high throughput. Additionally, it can increase
the security of network, but these large antennas will cause VI. CONCLUSION AND FUTURE WORK
serious interference to each other which will result into The new network 5G which we have studied, is enabling
inconsistent performance. This brings us to another many new applications and provide improvement to the
technology called Beam forming. However, Eavesdropping previous networking technology. This research introduced a
attack can become a major threat in massive MIMO brief knowledge about recent study in 5G Wireless
systems. To fight against this PLS can play a significant role Networks. Talking about security we have touched many
in 5G [8]. facets of it such as, Availability, Authentication, Data
Confidentiality, and Integrity. Many new security use cases
D.IoT: IoT nodes are generally low powered devices with are considered due to applications such as HetNet, IoT,
less computation capabilities. It becomes hard to maintain mMIMO, D2D and intrusion detection techniques. This
security for such nodes with many constraints in terms of many new possibilities and advancement of technology will
power and computational capabilities. It requires lead to new security requirements and there is lot more work
lightweight and efficient mechanism for security. Relaying is needed to be done in this area.
is popularly use to tackle these issues as an effective method Due to the heterogeneous nature of 5G mobile wireless
[10]. RFID stands for Radio Frequency Identification, network many new technologies are getting introduced in
which is widely used in IoT. RFID can be used in many industry. Many new technology use cases will also need to
applications of day to day life like inventory management, be studied in detail. This will bring in new challenges for
traffic flow automation etc. IoT is considered as most Network slicing, Software Defined Network(SDN),
promising technology, which is developing rapidly and will Network Function Virtualization(NFV), mobile cloud
require better network. computing, mobile ad-hoc networks for intrusion detection
in future mobile wireless network. Lot of work is carried out
E. Intrusion detection techniques: There are generally two for providing intrusion prevention, but intrusion detection
mechanisms used for providing the security in wired and overcoming it will be also major task considering the
network. Firstly firewall which is applied at the gateways, heterogeneous nature of 5G.We expect this thesis will help
switches or routers and secondly Intrusion Detection System

149
2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)

you in understanding the terminologies in 5G and will


provide you direction for further studies.

REFERENCES
[1] N. Panwar, S. Sharma and A. K. Singh, “A Survey on 5G: The Next
Generation of Mobile Communication”, Physical Communication,
vol.18, no. 2, pp. 64-84, 2016.
[2] Dongfeng Fang, Yi Qian, Rose Qingyang Hu. "Security for 5G
Mobile Wireless Networks", IEEE Access, 2018
[3] E. Dubrova, M. Naslund, and G. Selander, “CRC-Based Message
Authentication for 5G Mobile Technology”, IEEE
Trustcom/BigDataSE/ISPA, 2015, pp. 1186-1191.
[4] N. Adem, B. Hamdaoui, and A. Yavuz, “Pseudorandom Time-
Hopping Anti-Jamming Technique for Mobile Cognitive Users”,
2015 IEEE Globecom Workshops (GC Wkshps), 2015, pp. 1-6.
[5] M. Labib, S. Ha, and W. Saad, and J. H. Reed, “A Colonel Blotto
Game for Anti-jamming in the Internet of Things”, 2015 IEEE
Global Communications Conference (GLOBECOM), 2015, pp. 1-6
[6] Y. Ju, H. M. Wang, T. X. Zheng, and Q. Yin, “Secure transmission
with artificial noise in millimeter wave systems”, IEEE Wireless
Communications and Networking Conference, 2016, pp. 1-6
[7] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, ``Energy efficiency and
spectrum efficiency of multihop device-to-device communications
underlaying cellular networks,'' IEEE Trans. Veh. Technol., vol. 65,
no. 1, pp. 367_380, Jan. 2016.
[8] J. Qiao, X. Shen, J. Mark, Q. Shen, Y. He, and L. Lei, ``Enabling
device-to-device communications in millimeter-wave 5G cellular
networks,'' IEEE Commun. Mag., vol. 53, no. 1, pp. 209_215, Jan.
2015.
[9] W. Stallings, Cryptography and Network Security: Principles and
Prac-tice, 6th ed. London, U.K.: Pearson, 2014.
[10] Q. Xu, P. Ren, H. Song, and Q. Du, ``Security enhancement for IoT
communications exposed to eavesdroppers with uncertain locations,''
IEEE Access, vol. 4, pp. 2840_2853, 2016.
[11] Keke Gai, Meikang Qiu, Lixin Tao and Yongxin Zhu, “Intrusion
detection techniques for mobile cloud computing in heterogeneous
5G”, John Wiley & Sons, Ltd., SECURITY AND
COMMUNICATION NETWORKS research article.

150

You might also like