5th Generation Security Threats and Responses

5th Generation Security Threats and Responses

Sumit Dhariwal, Avani Sharma
DOI: 10.4018/978-1-6684-3921-0.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

5G could help with the extremely dependable and cost-effective networking of a huge number of devices (e.g., internet of things [IoT]), as well as universal broadband access and high user mobility. The current technical enablers for 5G are cloud computing, software-defined networking (SDN), and service-oriented virtualization (NFV). However, these technologies offer security issues in addition to raising concerns about user privacy. In this chapter, the authors give an outline of the security difficulties that these technologies face, as well as the privacy rules that apply to 5G. They also offer security remedies to these problems, as well as research directions for dependable 5G frameworks.
Chapter Preview
Top

Introduction

The Telecommunication Standardization Union (ITU) has named the International Leading Cellular standard as the worldwide requirement per the 5G wireless communication. IMT-Advanced is the 5th generation of 5G network technologies used in a cellular network. The international telecommunication union's radio communications area has said that 5G requires (Agiwal et al., 2016) I have always had the following characteristics: high mobility; ultra-reliability and low latency (1 Ms); andhigh peak data throughput of 10–20 Gb. Many 5G services are used to provide and work to construct systems and the matches need to be helpful and provide the 5g working environment for particularly greater speeds, but they lack wireless and wired network convergence. The Wi-Communication (Wi-Com) architecture created by the University of Cambridge, on the other hand, provides for heterogeneous networking. A fast core network and a sluggish periphery network are included (Alliance, 2015).

With us, the system is a combination of optical networks and peripheral communications, and it makes use of wireless technologies similar to the 5G system (3GPP, 2017), which is a significant part of the network and that network should be the main. (Security, 2013) (Kulkarni et al., 2016) (Vikas et al., 2014) Security issues in 4G operations have been carefully explored. Furthermore, for 5G heterogeneous mobile networks, there is presently no effective security protection. Even though Wi-Com contains a security solution with a multi-layered security system, investigations have revealed that many security risks might cause service disruptions and data loss. There are present and new perceived security concerns in 5Mobile communications, according to a study (La Polla et al., 2012).

Researchers from ETH_zurich university of Lorraine, and the other university like the university of dundee discovered that thieves might retrieve 5 G-related of communications networks and steal data due to multiple security flaws. This is due in part to “unspecified security goals” and “lack of precision,” according to a news statement from the group (Suo et al., 2013). As a result, 5G heterogeneous network requirements may be divided into two main categories: Mobile devices and operating company networks are both connected. Furthermore, certain transport security specifications, and must be useful and considered as ensuring the integrity of devices, discretion; ensuring controlled access to data; and preventing mobile devices from being stolen or tampered with, thus preventing data from being tampered with because it appears that 5G implementations require a subscriber's whole security architecture, we developed a new policy for a security management system to identifies whether attackers are using mobile devices in Wi-com situations. The model utilizes ITU_T guideline M.3400 to deal with data breaches, whether it has been done or not:

  • 1.

    An omniscient omnipotent (IA) approach for identifying malicious activity in edge devices.

  • 2.

    An identity cell that interacts with the Wi-Com system's classifiers.

  • 3.

    A regulatory virtuous loop generated by an end-user device is depicted as the personality cell.

Complete Chapter List

Search this Book:
Reset