What exactly is 5G security and why is it important?

What exactly is 5G security and why is it important?

New technologies always bring with them a lot of concerns about their negative potential, and 5G is no exception. While there are many legitimate 5G safety concerns that need to be addressed and discussed, it’s worth first dispelling the myth that 5G can cause health problems.

That’s not true – 5G technology is harmless to humans. With that, we’ll discuss what 5G is, what security risks it faces, and how experts are working to ensure 5G is safe.

What is 5G? 5G stands for the fifth generation of cellular mobile networks. 5G radio access network (RAN) and 5G core are very different from 4G LTE in terms of architecture and protocols. For example, 5G RAN uses new radio frequency (RF) protocols, provides wider and higher frequency band spectrum, and has an open distributed architecture.

5G core differences include:

  • SDN with Control and User Plane Separation (CUPS)
  • Decomposition provides more discrete control and scheduling capabilities
  • Virtualization and microservices (i.e. containers)
  • HTTP/2 (not GTP-C) control plane
  • TLS 1.3 encrypted control plane
  • Multi-access edge computing (MEC).

These all represent significant changes—and while in some cases they are expected to help improve security, in others they can lead to more vulnerabilities or even a lack of visibility. Additionally, a new 5G core is needed to help deliver on the expectations that 5G promises; high-band spectrum alone will not be enough to achieve this.

5G is expected to be about 100 times faster than current 4G networks, in part because they are built on high-band spectrum rather than mid-band spectrum. The speed boost will bring upgrades to everything from cloud robotics to health care.

However, a major drawback of such low-latency networks is range and penetration. Lower-power and higher-frequency signals don’t travel as far and have a harder time passing through walls, which is why it may take longer for 5G to become a standard feature of most mobile device services.

However, this lag in high-band adoption has one major advantage: experts have more time to find solutions to 5G security issues.

Many of the factors that make 5G so attractive, such as reduced latency and increased bandwidth, are also threats to security.

Here are some of the most prominent security threats:

New technology – New advances in technology often mean new problems. Given that 5G is not only new, but also very different from 4G, this means that while experts can predict some security vulnerabilities, others may not become apparent until a breach has already occurred.

More access points – 5G allows for many more access points. Each additional hardware touchpoint creates another potential opportunity for an attacker to gain access to the network. This means that all access points need to be monitored both physically and digitally.

Internet of Things (IoT) – 5G’s speeds are ideal for use with IoT devices. That said, an increase in connected machines could also mean an increase in 5G security risks. Smaller IoT devices like thermostats often have weaker security, and a vulnerability in one device could mean the entire system is compromised.

Speed ​​– 5G is fast enough to be considered for use in remote surgery and self-driving cars, but this also means it may be harder to track and prevent attacks. At the same time, such critical and sensitive data transmission will require a higher level of security to avoid communication disruptions, malicious behavior, or snooping/stealing of information.

Disaggregated architecture – 5G’s disaggregated architecture means that network functions can run freely from the underlying system hardware, allowing for improved control and visibility. However, each of these components will need its own security measures, rather than relying on a single overarching security approach.

Of course, these are just some of the risks facing 5G security. Keeping services and connected devices secure is rarely, if ever, a 100% guarantee.

5G Security Solutions

Although 5G networks present new and unique threats, there are already some ways to help ensure better 5G security:

  • Strengthening defenses for personal mobile and IoT devices
  • Zero Trust combined with software security fundamentals
  • End-to-end visibility
  • Threat analysis.

For optimal 5G security, the network should be treated as a zero-trust environment and it cannot be assumed that connected devices will have adequate security or vulnerability protection. Therefore, the first step should be to ensure adequate visibility across the network through appropriate security monitoring, threat detection, and mitigation processes, even before devices are connected to the 5G network.

Keeping 5G networks secure will be a collective effort involving network providers, cybersecurity experts, and customers themselves. As a second line of defense in conjunction with Zero Trust, a software security foundation for mobile and IoT devices needs to be developed in conjunction with network providers and cybersecurity companies.

Even an innocuous IoT device like a smart refrigerator should be equipped with a high level of security. More importantly, precautions should be taken to ensure that vulnerabilities in smaller IoT machines do not lead to unauthorized access to sensitive information.

Second, end-to-end visibility is critical to monitoring any system. This is especially necessary in 5G security because there are so many access points for malicious attackers to attack.

This monitoring should extend to all layers of the network, including physical network elements and the data plane. Effective monitoring will also provide important information for understanding new attacks. Combined with mitigation procedures, this will provide more effective defense against potential intrusions.

Threat analysis is a valuable way to track and even predict attacks. Ideally, these analytical systems will be able to develop preventative measures to stop the breach from happening. These programs provide important information in the ongoing process of protecting devices on 5G networks.


<<:  Ultra-wideband is no longer a highlight: 10 thoughts on 6G by Wu Hequan, an academician of the Chinese Academy of Engineering

>>:  ​From CDN to edge computing, computing power evolution accelerates again

Recommend

Faconhost: £17.5/year-1GB/15GB NVMe/500GB@300Mbps/Los Angeles 9929 line

Faconhost is a relatively new foreign hosting com...

How many HTTP requests can you guess on a TCP connection?

A classic interview question is what happens from...

Five signs SCVMM isn't right for your data center

Today, System Center Virtual Machine Manager (SCV...

2018 Yunnan-Huawei Software Industry Summit was held on December 20

The 2018 Yunnan-Huawei Software Industry Summit w...

Do I need to upgrade to WiFi 6? Find out here

[[390586]] 2020 is destined to be an extraordinar...

Interviewer: What are the ways of communication between components in React?

[[409233]] This article is reprinted from the WeC...

Analysis of the Art of Communication between Computers

Network Basics First, let's talk about networ...

On the "Kung Fu" of IT Operation and Maintenance

One day, Master Ma was walking on the street and ...