What exactly is 5G security and why is it important?

What exactly is 5G security and why is it important?

New technologies always bring with them a lot of concerns about their negative potential, and 5G is no exception. While there are many legitimate 5G safety concerns that need to be addressed and discussed, it’s worth first dispelling the myth that 5G can cause health problems.

That’s not true – 5G technology is harmless to humans. With that, we’ll discuss what 5G is, what security risks it faces, and how experts are working to ensure 5G is safe.

What is 5G? 5G stands for the fifth generation of cellular mobile networks. 5G radio access network (RAN) and 5G core are very different from 4G LTE in terms of architecture and protocols. For example, 5G RAN uses new radio frequency (RF) protocols, provides wider and higher frequency band spectrum, and has an open distributed architecture.

5G core differences include:

  • SDN with Control and User Plane Separation (CUPS)
  • Decomposition provides more discrete control and scheduling capabilities
  • Virtualization and microservices (i.e. containers)
  • HTTP/2 (not GTP-C) control plane
  • TLS 1.3 encrypted control plane
  • Multi-access edge computing (MEC).

These all represent significant changes—and while in some cases they are expected to help improve security, in others they can lead to more vulnerabilities or even a lack of visibility. Additionally, a new 5G core is needed to help deliver on the expectations that 5G promises; high-band spectrum alone will not be enough to achieve this.

5G is expected to be about 100 times faster than current 4G networks, in part because they are built on high-band spectrum rather than mid-band spectrum. The speed boost will bring upgrades to everything from cloud robotics to health care.

However, a major drawback of such low-latency networks is range and penetration. Lower-power and higher-frequency signals don’t travel as far and have a harder time passing through walls, which is why it may take longer for 5G to become a standard feature of most mobile device services.

However, this lag in high-band adoption has one major advantage: experts have more time to find solutions to 5G security issues.

Many of the factors that make 5G so attractive, such as reduced latency and increased bandwidth, are also threats to security.

Here are some of the most prominent security threats:

New technology – New advances in technology often mean new problems. Given that 5G is not only new, but also very different from 4G, this means that while experts can predict some security vulnerabilities, others may not become apparent until a breach has already occurred.

More access points – 5G allows for many more access points. Each additional hardware touchpoint creates another potential opportunity for an attacker to gain access to the network. This means that all access points need to be monitored both physically and digitally.

Internet of Things (IoT) – 5G’s speeds are ideal for use with IoT devices. That said, an increase in connected machines could also mean an increase in 5G security risks. Smaller IoT devices like thermostats often have weaker security, and a vulnerability in one device could mean the entire system is compromised.

Speed ​​– 5G is fast enough to be considered for use in remote surgery and self-driving cars, but this also means it may be harder to track and prevent attacks. At the same time, such critical and sensitive data transmission will require a higher level of security to avoid communication disruptions, malicious behavior, or snooping/stealing of information.

Disaggregated architecture – 5G’s disaggregated architecture means that network functions can run freely from the underlying system hardware, allowing for improved control and visibility. However, each of these components will need its own security measures, rather than relying on a single overarching security approach.

Of course, these are just some of the risks facing 5G security. Keeping services and connected devices secure is rarely, if ever, a 100% guarantee.

5G Security Solutions

Although 5G networks present new and unique threats, there are already some ways to help ensure better 5G security:

  • Strengthening defenses for personal mobile and IoT devices
  • Zero Trust combined with software security fundamentals
  • End-to-end visibility
  • Threat analysis.

For optimal 5G security, the network should be treated as a zero-trust environment and it cannot be assumed that connected devices will have adequate security or vulnerability protection. Therefore, the first step should be to ensure adequate visibility across the network through appropriate security monitoring, threat detection, and mitigation processes, even before devices are connected to the 5G network.

Keeping 5G networks secure will be a collective effort involving network providers, cybersecurity experts, and customers themselves. As a second line of defense in conjunction with Zero Trust, a software security foundation for mobile and IoT devices needs to be developed in conjunction with network providers and cybersecurity companies.

Even an innocuous IoT device like a smart refrigerator should be equipped with a high level of security. More importantly, precautions should be taken to ensure that vulnerabilities in smaller IoT machines do not lead to unauthorized access to sensitive information.

Second, end-to-end visibility is critical to monitoring any system. This is especially necessary in 5G security because there are so many access points for malicious attackers to attack.

This monitoring should extend to all layers of the network, including physical network elements and the data plane. Effective monitoring will also provide important information for understanding new attacks. Combined with mitigation procedures, this will provide more effective defense against potential intrusions.

Threat analysis is a valuable way to track and even predict attacks. Ideally, these analytical systems will be able to develop preventative measures to stop the breach from happening. These programs provide important information in the ongoing process of protecting devices on 5G networks.


<<:  Ultra-wideband is no longer a highlight: 10 thoughts on 6G by Wu Hequan, an academician of the Chinese Academy of Engineering

>>:  ​From CDN to edge computing, computing power evolution accelerates again

Recommend

Ransomware cannot be prevented? "Dynamic security defense" + "key data backup"

Recently, a well-known domestic financial softwar...

3 Ways 5G is Driving Edge Intelligence

5G is closely tied to edge computing. With a whol...

Can hyper-converged systems benefit from SDN architecture?

Hyperconverged systems are rapidly gaining popula...

Several emerging trends in the SD-WAN space

[[337703]] 【51CTO.com Quick Translation】 The glob...

In the era of the Internet of Things, how will smart hardware affect our lives?

In recent years, the Internet of Things (IoT) has...

When will the chaos of number portability end?

The full implementation of the number portability...

5G IoT may be the next opportunity

Now that 5G mobile services have begun to enter t...

Don’t know how to access the router system backend? Learn it in one step!

Wireless routers are essential network devices fo...

Fiber pre-entry: A new strategy to accelerate FTTH deployment

With the progress and development of human societ...