Professional Documents
Culture Documents
5G Security: March 2022
5G Security: March 2022
net/publication/359068856
5G security
CITATIONS READS
0 31
1 author:
Aysha Alfaw
University of Bahrain
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Aysha Alfaw on 07 March 2022.
Abstract—This 5G technology is providing the broadband network monitoring and data forwarding. Application
access in whole world, entertaining the user mobility with Connectivity is a type of networking which is known
higher approach, Also ensured that a number of as Software Defined Network (SDN) which allows for
electronic devices such as the Internet of Things (IoT) are
the softwarization of network functions.
connected in a very reliable and affordable manner.
Every technologist or technology enablers trying to SDN, on one hand, promotes networking
inherit the useability of 5th generation technology in their innovation through abstraction and, on the other side,
products such as SDN (Software Defined Networking), simplifies network management. Network Function
NFV and cloud computing. In the implementation of this Virtualization (NFV) reduces the requirement for
technology there are several challenges with respect to functionality or service-specific hardware by allowing
user’s privacy and user’s security. In this paper, we will diverse network functions to be placed in different
discuss the security challenges and threats which can
network perimeters as needed. SDN and NFV, when
occur due to the implementation of this technology, most
used together, increase network flexibility, reduce the
importantly we will overview the challenges for users’
obstacle of supplier proprietary solutions by
privacy. At the end of this paper, we will present some
simplifying network control and administration,
solutions regarding the challenges that can occur due to
making it critical for the networks of the future.
implementation of 5G. We will also discuss some
directions that will give a guideline for further
Despite the technology of innovation and method, the
development and implementation for a secure 5th security of network and user privacy will continue to
generation system. be a significant concern for future networks [2].
1
enables systems. There are some basic obstacles for A.2.1 SDN and NFV challenges:
the implementation of 5G in smart phones’ networks:
5G cellular networks are expected to be the main
• An abundance of end-user gadgets and infrastructure for providing a service, which brings
novelties new challenges to the desired goals of upcoming
• Encrypted keys for radio interfaces delivered networks.
across unsecure channels. So, security for it is the
main concerns. NFV is facing several challenges, so it is important to
• Integrity of the user plane provide a secure implementation of operations for
• The usage of security measures is optional due example data communication and virtual machine
to service-driven limits on the security architecture. (VM).
• Migrating from one operator network to Also , SDN in the 5G network facing challenges, such
someone else does not modify user-security as in control and confidentiality. It is an important to
parameters, resulting in security breaches. support the heterogeneity of devices with survivability
• Operating systems, programs, and and so on [15].
configuration data on consumer devices are not
protected by security measures. A.3 Security Threats in Mobile Clouds:
Some principles are designed to follow the mobile As cloud applications share a variety of options, these
network companies to implement the 5G technology: options are possible for individual users to send out
By adopting new computing and networking damaging traffic in a proper sequence to delay in
technologies, that able to create a shared composable network, use more networks or others, or obtain illegal
core and simplify operations and administration. Here accessing towards other people's data users'
are the following security concerns that must be prone connections. Tenants in multi-tenant cloud networks
by targeting some elements etc.[18][19]. implement its individual control algorithm, interaction
could potentially lead to communication configuration
A.1 Security Threats in NFV and SDN: conflicts. Cloud services ideas are integrated into 5G
By centralizing network control systems, SDN ecosystems through Mobile Cloud Computing (MCC).
promotes programmability in communication This results in a slew of security problems, the most of
networks. On the other side, these two disruptive which are due to 5G's architectural and infrastructural
characteristics open the door to network breaching upgrades. As a result, the open nature of MCC and the
and hacking. SDN is vulnerable to DoS attacks due to resilience of mobile phones provide vulnerabilities
its popularity. For virtualized telecom services, NFV through which attackers can launch attacks and
systems do not provide enough security and isolation. threaten mobile cloud privacy [2].
Virtual Network Functions (VNFs) are complex and Depending on which cloud portions are targeted, MCC
dynamic, which contributes to configuration blunders hazards are broken down into three categories:
and, as a result, privacy holes, is one of the most
persistent challenges with NFV adoption in cellular The security of mobile and network-based concerns
carriers [1] [5]. for front-end, back-end. The client platform, the client
platform is the front end of the MCC architecture that
A.2 Privacy Threats and Challenges for 5th consists of the mobile terminal applications and
Generation technology: interfaces required to access the running cloud
The most serious privacy issues for users may arise services. The back-end platform consists of cloud
from data, location, and id. Several hand-held devices, storage, hard disks, VMS, hypervisors, and standards
as well as their apps or programs, require personal that are required to deliver cloud services. Security
information from the subscriber before they may be problems are mostly addressed at mobile cloud
loaded. Programmers or organizations rarely describe servers on this platform. Radio Access Technologies
how well the data will be stored or for what purposes (RATs), which connect mobile devices connected to
that will used. Subscribers' location privacy is largely the Internet, is the subject of network-based mobile
targeted by threats. security challenges. It can use Wi-Fi, or any other 5G
advanced RAT devices [20].
There is a risk with the user data and privacy when
storing in a cloud in another country because every
country has different degrees of data privacy
regulations that respect the specific authentication [6].
2
A.4 Security Threats for Communicating Channels: the challenges of security in attack and defense. By
analyzing and integrating defense/attack objects in
Attacking only-used-in-mobile-networks every layer of 5G.
communications protocols necessitates a high degree The main challenge hardware devices and wireless at
of knowledge. Standard SDN interfaces, rather than the physical layer is destruction by malicious, fake
specific interfaces, will be used in SDN-based 5G devices and side-channel attacks.
networks. As these APIs become more widely
available, the number of potential attackers grows. Accordingly, the first and second problems cause
The 5th Generation ecosystem will include drone device unavailability and data leakage, it is solved by
technology and air aviation controlling, cloud- the security department, which prevents attackers to
powered VR, linked cars, factories that are get close to the device.
smart(technology-wise), cloud-powered robotics,
transit, and their working conditions. Finally, fake device issues which cause a man-in-
the-middle attack can be resolved through
As a result, applications require very secure authorization and encryption mechanisms. The main
environment solutions that allow for more frequent security challenges at the data link layer are data
authentication and the transmission of critical data leakage due to the shared resource. The solutions are
[14]. Virtual Machine slice isolation, encryption, data
erasure, authorization, and secured communication
protocol (TLS, SSH).
3
management of security functions and the security 5G requires effective communication channel security
services over layers in 5G network. not just to avoid security risks, but also to maintain
the extra benefits of SDN such as centralized policy
Zhang et al. [16] they discussed a various security administration, programmability, and worldwide
issues from different perspectives, for example 4G network status transparency. Privacy-by-design
networks with new architectures and challenges. They strategies must be used in 5G, in which privacy is
talked about the solution of 5G security from from handled from the beginning of the system and many
several perspectives, with cloud environment, new key features are built-in Network carriers must
core networks, and radio technologies and security implement a composite virtualized method that
architecture. enables them to retain and operate sensitive personal
data regionally while retaining and analyzing less
sensitive data on public clouds[21]
[2] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. [12] D. Jeyakumar and C. Rajabhushanam, “Security challenges
Ylianttila, and A. Gurtov, “5G security: Analysis of threats and and solutions for cloud radio access networks,” in 2019
solutions,” in 2017 IEEE Conference on Standards for International Conference on Smart Systems and Inventive
Communications and Networking (CSCN), 2017, pp. 193–199. Technology (ICSSIT), 2019, pp. 961–965.
[3] “What is 5G | Everything You Need to Know About 5G | 5G [13] I. Adam and J. Ping, “Framework for security event
FAQ | Qualcomm.” https://www.qualcomm.com/5g/what-is-5g management in 5G,” in Proceedings of the 13th International
(accessed Nov. 27, 2021). Conference on Availability, Reliability and Security - ARES 2018,
2018.
[4] “5G explained: What it is, who has 5G, and how much faster is
[14] K. M. S. Huq and J. Rodriguez, Backhauling / Fronthauling for
it really?”
Future Wireless Systems. Nashville, TN: John Wiley & Sons, 2016.
https://edition.cnn.com/interactive/2020/03/business/what-is-
5g/index.html (accessed Nov. 27, 2021).
[15] H. Fourati, R. Maaloul, and L. Chaari, “A survey of 5G
[5] V. Hemant Dixit, S. Kyung, Z. Zhao, A. Doupé, Y. network systems: challenges and machine learning
Shoshitaishvili, and G.-J. Ahn, “Challenges and Preparedness of approaches,” Int. j. mach. learn. cybern., vol. 12, no. 2, pp. 385–
431, 2021.
SDN-based Firewalls,” Proceedings of the 2018 ACM International
Workshop on Security in Software Defined Networks & Network [16] S. Zhang, Y. Wang, and W. Zhou, “Towards secure 5G
Function Virtualization, vol. 18, 2018, doi: 10.1145/3180465.
networks: A Survey,” Comput. netw., vol. 162, no. 106871, p.
106871, 2019.
4
[17] “ShieldSquare captcha,” Iop.org. [Online]. Available: [21] T. Kumar, M. Liyanage, A. Braeken, I. Ahmad, and M.
https://iopscience.iop.org/article/10.1088/1742- Ylianttila, “From gadget to gadget-free hyperconnected world:
6596/1714/1/012052/meta. [Accessed: 17-Dec-2021]. Conceptual analysis of user privacy challenges,” in 2017 European
Conference on Networks and Communications (EuCNC), 2017, pp.
[18] Researchgate.net. [Online]. Available:
1–6.
https://www.researchgate.net/profile/Shahzeb-
Soomro/publication/352787173_Security_Issues_in_5G_A_Review
_Paper/links/60d9a0a2a6fdccb745ece964/Security-Issues-in-5G-A-
Review-Paper.pdf. [Accessed: 18-Dec-2021].