5G is evolving to be more secure than 4G

5G is evolving to be more secure than 4G

Some people say that 5G network speed is 10-100 times faster than 4G, so the speed of network attack also increases synchronously. However, in fact, 5G network security is also evolving. At least 5G is safer than 4G for the following reasons:

[[275803]]

5G is here, but the threat has not increased

In the 2G era, it was common for mobile communications to be exploited by the black industry. In the 3G era, fake base stations still seem to bother the public, but now the 4G network, even though we know there are some security risks, it is difficult to exploit, and attacks by the black industry are rarely discovered.

So what about the 5G era? As some people think, with the increase in transmission speed, will the security threat also be greater? In fact, this is still possible, but its security improvement must also be taken seriously.

5G is inherently more secure than previous generations

Although 5G technology is innovative, it is also an evolution of 2G, 3G, and 4G mobile technologies. Therefore, from a purely security technology perspective, 5G is an improvement after understanding the weaknesses of previous generations of mobile network technology, so it is more secure than ever before. For example, user data integrity, roaming authentication, and information protection have been enhanced, just like it encrypts the attribution during transmission.

In terms of network design, the evolution and innovation of 5G in transmission network, bearer network, core network resource layer, upload service network and other aspects, as well as the continuous improvement of the localization level of related equipment, have correspondingly strengthened the security of 5G network. At the same time, the manageability of 5G network has also been strengthened.

5G does not expose more attack surfaces

It should be said that the security features of 5G are first reflected in the core network of 5G. Currently, we only see the NFC mode. We need to wait for the real core network of 5G to be implemented before we can see more implementation. Secondly, 5G has three very important application scenarios, ultra-wideband, network connection, and low latency, but in terms of standards, there is only eMBB, and the other two have not yet been implemented. And if we only look at the eMBB service type, 5G has not exposed more attack surfaces than 4G.

In addition, in the combination of 5G and vertical industries, such as the private network for industrial enterprises, it does not need to support roaming or interoperability with various other devices, and can be combined with trusted technologies to effectively increase security.

Talking about 5G security needs to start from three points

3G and 4G are the infrastructure of mobile Internet, and 5G will become the infrastructure of industrial Internet. Therefore, when paying attention to 5G security, we must start from three points.

  • First, system security. When 5G arrives, the problems of traditional mobile networks may be avoided or may continue to exist. More importantly, some new problems may arise. At this time, it is necessary to control security from the overall system level.
  • Second, business security. 5G has new services and scenarios, and these services and business scenarios have their own business security issues that need attention.
  • Third, data security. 5G is an era of the Internet of Everything. There will be more detectors and cameras around people. In that case, user privacy issues and some information content security issues must be taken into account.

summary

In the future, my country will obviously need to build an endogenous, closed-loop 5G security system. Of course, the above conclusion may be premature, because the 5G era has not yet arrived, and the speed and hybrid attacks of the 5G era have not yet experienced the baptism of actual combat defense.

<<:  Introducing social capital to solve the 5G network construction dilemma

>>:  The three major operators unprecedentedly unified unlimited packages and removed them from the shelves to save themselves

Recommend

5G healthcare development direction and challenges

[[403098]] The development of 5G healthcare has e...

Who is responsible for the rampant online black industry?

[[188973]] A set of data: According to the 38th &...

5 Service Level Agreement Best Practices for a Unified Communications Strategy

Organizations need strong SLAs to meet their UCaa...

5G network construction 80%: 5G robots are about to usher in a new turning point

Recently, according to CCTV News, China had compl...

The rewards and risks facing retailers in a 5G world

The rollout of 5G is expected to have a significa...

Computer software: Recommend 10 practical office efficiency tools

[[395494]] 1. Everything search tool Everything i...

The current status and future prospects of 5G in the IoT market

The global 5G in IoT market is experiencing signi...