Is Network really in danger with the invention of 5G ?
5G or the
5th generation is the latest mobile network technology. It was developed after
1G, 2G, 3G, and 4G networks. The specialties of 5G are telecommunication system
aims to deliver enhanced mobile broadband, massive machine-type communications,
and Ultra-reliable and low latency communications. 5G enables a new kind of network that is designed to connect
virtually everyone and everything together including machines, objects, and
devices. Some of the enhanced controls are included in 5G
technology such as mutual authentication capabilities, enhanced subscriber
identity protection, and additional security mechanisms. Depending on the
type of application 5G is several times faster than the 4G.
Modern telecommunication
networks can be logically separated into four parts as a radio access
network, core network, transport network, and interconnect network.
In terms of network security, all three planes can each be exposed
to unique types of threats. There are also uniform threats that can
affect all three planes simultaneously.
Industry experts have warned the industry about the possible
exploits that can be found within 5G network. 5G exploits have the potential to
worsen existing threats and introduce new ones. The Brookings The institution,
a nonprofit public policy organization, has identified five ways of network
vulnerabilities that could happen with 5G technology.
- In
5G, the virtualized higher-level software functions are performed on the
end-user devices. It makes them connected as in a network. The
possibilities of attacks are higher because the access to endpoints is
easy.
- When
it comes to software there can not be instances that they are error-free,
because of that even though the software vulnerabilities can not be hidden
forever. Attackers can take the control of the software and can control
the entire network.
- The high bandwidth can open the network to a higher number of
risk vectors and initiate more vulnerabilities because network monitoring
is not easy in a high-speed network. The high speed and volume will make
news challenges for Security teams to fight against viruses, hacking, and
other possible threats.
- Because
of the decentralized nature of 5G networks, there are many traffic
routings point to monitor. The security teams cannot give a 100%
guarantee about the security of an enterprise until all of these endpoints
are closely monitored.
- With the expansion of IoT technology, lots of smart devices have come to the market targeting normal users. These smart devices are easily hackable and also, they are interconnected. Since these smart devices are used in many industries such as Healthcare, transportation, education, power supplies,
etc. huge disasters could be done by hacking a small smart device.
References

Nice flow. Keep writing.
ReplyDeleteThank you
DeleteVery Informative.
ReplyDeletethanks kavii
DeleteInformative article Suranga.You have explained about 5G and is there any relation between 5G technology and Wi-Fi?
ReplyDelete5G and 5 GHz Wi-Fi are both used for wireless connectivity, and there is nothing in common than this between them. Anyone referring to “5G Wi-Fi” actually means 5 GHz Wi-Fi, which is different from the 5G cellular standard.
DeleteYou can read more from the below link:
https://www.howtogeek.com/398620/whats-the-difference-between-5g-and-5ghz-wi-fi/
Good read Suranga. Keep writing!
ReplyDeleteThank you
DeleteInformative article Suranga. It is good to aware about the latest threat with the 5G network.
ReplyDeleteThank you Rajitha
Delete