Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/359068856

5G security

Research · March 2022


DOI: 10.13140/RG.2.2.25566.51529

CITATIONS READS

0 31

1 author:

Aysha Alfaw
University of Bahrain
1 PUBLICATION   0 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Aysha Alfaw on 07 March 2022.

The user has requested enhancement of the downloaded file.


5G Security Threats

Aysha H.Alfaw Alauddin Y.Al-Omary


College of information technology Department of Computer Engineering
University of Bahrain College of information technology
Sakhir,Bahrain University of Bahrain
20011036@stu.uob.edu.bh Sakhir,Bahrain
aalomary@ uob.edu.bh

Abstract—This 5G technology is providing the broadband network monitoring and data forwarding. Application
access in whole world, entertaining the user mobility with Connectivity is a type of networking which is known
higher approach, Also ensured that a number of as Software Defined Network (SDN) which allows for
electronic devices such as the Internet of Things (IoT) are
the softwarization of network functions.
connected in a very reliable and affordable manner.
Every technologist or technology enablers trying to SDN, on one hand, promotes networking
inherit the useability of 5th generation technology in their innovation through abstraction and, on the other side,
products such as SDN (Software Defined Networking), simplifies network management. Network Function
NFV and cloud computing. In the implementation of this Virtualization (NFV) reduces the requirement for
technology there are several challenges with respect to functionality or service-specific hardware by allowing
user’s privacy and user’s security. In this paper, we will diverse network functions to be placed in different
discuss the security challenges and threats which can
network perimeters as needed. SDN and NFV, when
occur due to the implementation of this technology, most
used together, increase network flexibility, reduce the
importantly we will overview the challenges for users’
obstacle of supplier proprietary solutions by
privacy. At the end of this paper, we will present some
simplifying network control and administration,
solutions regarding the challenges that can occur due to
making it critical for the networks of the future.
implementation of 5G. We will also discuss some
directions that will give a guideline for further
Despite the technology of innovation and method, the
development and implementation for a secure 5th security of network and user privacy will continue to
generation system. be a significant concern for future networks [2].

Keyword: 5G, 5G security, 5G attack , 5G security Threat , II. LITERATURE REVIEW:


Telecommunication, Privacy, SDN, NFV. 5G refers to the 5th generation mobile network, that
came after the 4G network, 5G provides a new type of
I. INTRODUCTION
network which had designed to connect virtually to
5G network aims to achieve ''internet of everyone such as devices, machines, and objects.
everything”, and it adopts many technologies which
support services and applications, for example Virtual 5G provides faster speeds and authoritative
Reality (VR), Augmented Reality (AR), IoT, Internet connections on smartphones and other devices [3]. 5G
of Vehicles (IoV) [1]. As the 5G network is growing, is beneficial because it has greater bandwidth that
many challenges will arise, and there is much research means works with many connected devices than
related to network security and challenges. 5G previous networks [4]. Consequently, there is much
network is the first network that utilizes frequencies in
research about 5G security threats.
the 24-86 GHz band for communications[17].
The vision of 5th Generation wireless connections A. Security Threats in 5G :
is to deliver exceptionally large bandwidth and 5th Generation connect essential infrastructure,
penetration by deploying dense base stations with necessitating increased security to safeguard not just
enhanced productivity, greatly improved Quality of the safety of critical infrastructure but also the safety
Service (QoS), and extraordinarily low lag. Innovative of society overall.
networking, system distribution, storage, and
A security compromise in electronic power supply
processing methods that will be needed to offer the
systems, for example, may be devastating for all of
compulsory services envisioned by 5G. Cloud
society's electrical and electronic systems.
computing enables administrators to efficiently
manage data, resources, and services despite having to as well as to evaluate alternatives that are possible
spend on infrastructure. By segregating the Planes for might lead to safe 5th Generation’s technology

1
enables systems. There are some basic obstacles for A.2.1 SDN and NFV challenges:
the implementation of 5G in smart phones’ networks:
5G cellular networks are expected to be the main
• An abundance of end-user gadgets and infrastructure for providing a service, which brings
novelties new challenges to the desired goals of upcoming
• Encrypted keys for radio interfaces delivered networks.
across unsecure channels. So, security for it is the
main concerns. NFV is facing several challenges, so it is important to
• Integrity of the user plane provide a secure implementation of operations for
• The usage of security measures is optional due example data communication and virtual machine
to service-driven limits on the security architecture. (VM).
• Migrating from one operator network to Also , SDN in the 5G network facing challenges, such
someone else does not modify user-security as in control and confidentiality. It is an important to
parameters, resulting in security breaches. support the heterogeneity of devices with survivability
• Operating systems, programs, and and so on [15].
configuration data on consumer devices are not
protected by security measures. A.3 Security Threats in Mobile Clouds:

Some principles are designed to follow the mobile As cloud applications share a variety of options, these
network companies to implement the 5G technology: options are possible for individual users to send out
By adopting new computing and networking damaging traffic in a proper sequence to delay in
technologies, that able to create a shared composable network, use more networks or others, or obtain illegal
core and simplify operations and administration. Here accessing towards other people's data users'
are the following security concerns that must be prone connections. Tenants in multi-tenant cloud networks
by targeting some elements etc.[18][19]. implement its individual control algorithm, interaction
could potentially lead to communication configuration
A.1 Security Threats in NFV and SDN: conflicts. Cloud services ideas are integrated into 5G
By centralizing network control systems, SDN ecosystems through Mobile Cloud Computing (MCC).
promotes programmability in communication This results in a slew of security problems, the most of
networks. On the other side, these two disruptive which are due to 5G's architectural and infrastructural
characteristics open the door to network breaching upgrades. As a result, the open nature of MCC and the
and hacking. SDN is vulnerable to DoS attacks due to resilience of mobile phones provide vulnerabilities
its popularity. For virtualized telecom services, NFV through which attackers can launch attacks and
systems do not provide enough security and isolation. threaten mobile cloud privacy [2].
Virtual Network Functions (VNFs) are complex and Depending on which cloud portions are targeted, MCC
dynamic, which contributes to configuration blunders hazards are broken down into three categories:
and, as a result, privacy holes, is one of the most
persistent challenges with NFV adoption in cellular The security of mobile and network-based concerns
carriers [1] [5]. for front-end, back-end. The client platform, the client
platform is the front end of the MCC architecture that
A.2 Privacy Threats and Challenges for 5th consists of the mobile terminal applications and
Generation technology: interfaces required to access the running cloud
The most serious privacy issues for users may arise services. The back-end platform consists of cloud
from data, location, and id. Several hand-held devices, storage, hard disks, VMS, hypervisors, and standards
as well as their apps or programs, require personal that are required to deliver cloud services. Security
information from the subscriber before they may be problems are mostly addressed at mobile cloud
loaded. Programmers or organizations rarely describe servers on this platform. Radio Access Technologies
how well the data will be stored or for what purposes (RATs), which connect mobile devices connected to
that will used. Subscribers' location privacy is largely the Internet, is the subject of network-based mobile
targeted by threats. security challenges. It can use Wi-Fi, or any other 5G
advanced RAT devices [20].
There is a risk with the user data and privacy when
storing in a cloud in another country because every
country has different degrees of data privacy
regulations that respect the specific authentication [6].

2
A.4 Security Threats for Communicating Channels: the challenges of security in attack and defense. By
analyzing and integrating defense/attack objects in
Attacking only-used-in-mobile-networks every layer of 5G.
communications protocols necessitates a high degree The main challenge hardware devices and wireless at
of knowledge. Standard SDN interfaces, rather than the physical layer is destruction by malicious, fake
specific interfaces, will be used in SDN-based 5G devices and side-channel attacks.
networks. As these APIs become more widely
available, the number of potential attackers grows. Accordingly, the first and second problems cause
The 5th Generation ecosystem will include drone device unavailability and data leakage, it is solved by
technology and air aviation controlling, cloud- the security department, which prevents attackers to
powered VR, linked cars, factories that are get close to the device.
smart(technology-wise), cloud-powered robotics,
transit, and their working conditions. Finally, fake device issues which cause a man-in-
the-middle attack can be resolved through
As a result, applications require very secure authorization and encryption mechanisms. The main
environment solutions that allow for more frequent security challenges at the data link layer are data
authentication and the transmission of critical data leakage due to the shared resource. The solutions are
[14]. Virtual Machine slice isolation, encryption, data
erasure, authorization, and secured communication
protocol (TLS, SSH).

Researchers in [9] had proposed new case use for


B5G/6G networks, which is called Ultra Secure Low
Latency Communications. However, that serves the
privacy and response time that needs. They studied
the feasibility of securing the physical layer as an
enabler for (US-LLC). Physical Layer Security has
been described promising feature for privacy and
latency from upcoming B5G/6G wireless networks.

Park et al [10] discussed new technologies and


models such as Blockchain of 5G security at
networks, which is a big revolution in communication
technologies in 5G for the future. The data are linked
to each other in chains. The blockchain has various
characteristics for example decentralization and
distribution, which can provide more security in the
Table 1: Security challenges in 5G [2] 5G network. Blockchain gives a secure data
mechanism in transportation applications and
As table 1 shows above, summarizes the security
Blockchain gives a fast security authentication.
challenges of the 5G network. Presents some types of
security threats, security attacks, the objects or services In this paper [11], the authors have highlighted that
targeted on the network, the which is most vulnerable the need to develop the 3GPP, 5G standards and
from threats and attacks. As well, the security NIST, to the goal of beginning quantum ready for 5G
challenges are briefly described in this table [2]. core network. The security and privacy essentially be
on symmetric-key cryptography.
III. SECURITY SOLUTOIN 5G :
5G has higher security than previous systems. To grant security and integrity to 5G, it must provide
Suomalainen et al. [7] in this article, delved into the a unique technology. In [12], the authors look at the
security challenges that had potential, when Open Systems Interconnection (OSI) layers and the
integrating the Machine learning (ML) technology use of security technologies. The 5G network security
into 5G. Threats which ML induce are classified into solution uses the OSI protocol instead of the four-
five categories such as: spoofing, tampering, layer TCP/IP format
repudiation, disclosure of information, and denial-of-
Adam and Ping [13] have presented a paper that
service (DoS) [8].
related to ''security Event Management in 5G
There is much research that has focused on the network'', where was provided a framework for
security of 5G networks, research papers [9] present automated SLA (Service Level Agreements ) driven

3
management of security functions and the security 5G requires effective communication channel security
services over layers in 5G network. not just to avoid security risks, but also to maintain
the extra benefits of SDN such as centralized policy
Zhang et al. [16] they discussed a various security administration, programmability, and worldwide
issues from different perspectives, for example 4G network status transparency. Privacy-by-design
networks with new architectures and challenges. They strategies must be used in 5G, in which privacy is
talked about the solution of 5G security from from handled from the beginning of the system and many
several perspectives, with cloud environment, new key features are built-in Network carriers must
core networks, and radio technologies and security implement a composite virtualized method that
architecture. enables them to retain and operate sensitive personal
data regionally while retaining and analyzing less
sensitive data on public clouds[21]

IV. CONCLUSION: [6] M. Liyanage, J. Salo, A. Braeken, T. Kumar, S. Seneviratne,


and M. Ylianttila, “5G Privacy: Scenarios and Solutions,” in 2018
Mobile clouds, SDN, and NFV will be used in 5G to IEEE 5G World Forum (5GWF), 2018, pp. 197–203.
address the difficulties of huge interconnectedness,
[7] J. Suomalainen, A. Juhola, S. Shahabuddin, A. Mämmelä, and I.
agility, and affordability. These technologies, for all
Ahmad, “Machine Learning Threatens 5G Security,” IEEE Access,
of their benefits, also pose a security concern. As a vol. 8, pp. 190822–190842, 2020, doi:
consequence, the research highlighted the main 10.1109/ACCESS.2020.3031966.
security risks in this study, which, if not addressed
[8] Z. Tian, Y. Sun*, S. Su, M. Li, X. Du, and M. Guizani,
properly, might make 5G riskier. The paper presented “Automated Attack and Defense Framework for 5G Security on
the security procedures and solutions that may be Physical and Logical Layers,” Feb. 2019, Accessed: Nov. 28, 2021.
employed to deal with these problems. In a.ddition, as [Online]. Available: https://arxiv.org/abs/1902.04009v1
more consumer devices become linked and more [9] A. K. Yerrapragada, T. Eisman, and B. Kelley, “Physical Layer
different sets of services are supplied in 5G, Security for Beyond 5G: Ultra Secure Low Latency
telecommunications privacy and security risks will Communications,” IEEE Open Journal of the Communications
become more obvious. To summarise, as new 5G Society, vol. 2, pp. 2232–2242, Aug. 2021, doi:
10.1109/OJCOMS.2021.3105185.
technologies and services are adopted, new types of
security risks and vulnerabilities are expected to [10] J. H. Park et al., “A Comprehensive Survey on Core
emerge. However, tackling these concerns from the Technologies and Services for 5G Security: Taxonomies, Issues,
and Solutions page1 / 22 A Comprehensive Survey on Core
start would be preferable throughout deployment will Technologies and Services for 5G Security: Taxonomies, Issues,
reduce the risk of privacy and security breaches. and Solutions,” Human-centric Computing and Information
Sciences, vol. 11, p. 3, 2021, doi: 10.22967/HCIS.2021.11.003.
V. REFRENCES:
[1] Z. Tian, Y. Sun*, S. Su, M. Li, X. Du, and M. Guizani, [11] T. C. Clancy, R. W. McGwier, and L. Chen, “Post-quantum
“Automated Attack and Defense Framework for 5G Security on cryptography and 5G security: Tutorial,” in Proceedings of the 12th
Physical and Logical Layers,” Feb. 2019, Accessed: Nov. 27, 2021. Conference on Security and Privacy in Wireless and Mobile
[Online]. Available: https://arxiv.org/abs/1902.04009v1 Networks, 2019.

[2] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. [12] D. Jeyakumar and C. Rajabhushanam, “Security challenges
Ylianttila, and A. Gurtov, “5G security: Analysis of threats and and solutions for cloud radio access networks,” in 2019
solutions,” in 2017 IEEE Conference on Standards for International Conference on Smart Systems and Inventive
Communications and Networking (CSCN), 2017, pp. 193–199. Technology (ICSSIT), 2019, pp. 961–965.

[3] “What is 5G | Everything You Need to Know About 5G | 5G [13] I. Adam and J. Ping, “Framework for security event
FAQ | Qualcomm.” https://www.qualcomm.com/5g/what-is-5g management in 5G,” in Proceedings of the 13th International
(accessed Nov. 27, 2021). Conference on Availability, Reliability and Security - ARES 2018,
2018.
[4] “5G explained: What it is, who has 5G, and how much faster is
[14] K. M. S. Huq and J. Rodriguez, Backhauling / Fronthauling for
it really?”
Future Wireless Systems. Nashville, TN: John Wiley & Sons, 2016.
https://edition.cnn.com/interactive/2020/03/business/what-is-
5g/index.html (accessed Nov. 27, 2021).
[15] H. Fourati, R. Maaloul, and L. Chaari, “A survey of 5G
[5] V. Hemant Dixit, S. Kyung, Z. Zhao, A. Doupé, Y. network systems: challenges and machine learning
Shoshitaishvili, and G.-J. Ahn, “Challenges and Preparedness of approaches,” Int. j. mach. learn. cybern., vol. 12, no. 2, pp. 385–
431, 2021.
SDN-based Firewalls,” Proceedings of the 2018 ACM International
Workshop on Security in Software Defined Networks & Network [16] S. Zhang, Y. Wang, and W. Zhou, “Towards secure 5G
Function Virtualization, vol. 18, 2018, doi: 10.1145/3180465.
networks: A Survey,” Comput. netw., vol. 162, no. 106871, p.
106871, 2019.

4
[17] “ShieldSquare captcha,” Iop.org. [Online]. Available: [21] T. Kumar, M. Liyanage, A. Braeken, I. Ahmad, and M.
https://iopscience.iop.org/article/10.1088/1742- Ylianttila, “From gadget to gadget-free hyperconnected world:
6596/1714/1/012052/meta. [Accessed: 17-Dec-2021]. Conceptual analysis of user privacy challenges,” in 2017 European
Conference on Networks and Communications (EuCNC), 2017, pp.
[18] Researchgate.net. [Online]. Available:
1–6.
https://www.researchgate.net/profile/Shahzeb-
Soomro/publication/352787173_Security_Issues_in_5G_A_Review
_Paper/links/60d9a0a2a6fdccb745ece964/Security-Issues-in-5G-A-
Review-Paper.pdf. [Accessed: 18-Dec-2021].

[19] N. Vreman and M. Maggio, “Multilayer distributed control


over 5G networks: Challenges and security threats,” in Proceedings
of the Workshop on Fog Computing and the IoT, 2019.

[20] Researchgate.net. [Online]. Available:


https://www.researchgate.net/publication/236117981_LTESAE_sec
urity_issues_on_4G_wireless_networks. [Accessed: 18-Dec-2021].

View publication stats

You might also like