Is Network really in danger with the invention of 5G ?




5G or the 5th generation is the latest mobile network technology. It was developed after 1G, 2G, 3G, and 4G networks. The specialties of 5G are telecommunication system aims to deliver enhanced mobile broadband, massive machine-type communications, and Ultra-reliable and low latency communications. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. Some of the enhanced controls are included in 5G technology such as mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms. Depending on the type of application 5G is several times faster than the 4G.

Modern telecommunication networks can be logically separated into four parts as a radio access network, core network, transport network, and interconnect network. In terms of network security, all three planes can each be exposed to unique types of threats. There are also uniform threats that can affect all three planes simultaneously.

Industry experts have warned the industry about the possible exploits that can be found within 5G network. 5G exploits have the potential to worsen existing threats and introduce new ones. The Brookings The institution, a nonprofit public policy organization, has identified five ways of network vulnerabilities that could happen with 5G technology.

  • In 5G, the virtualized higher-level software functions are performed on the end-user devices. It makes them connected as in a network. The possibilities of attacks are higher because the access to endpoints is easy.
  • When it comes to software there can not be instances that they are error-free, because of that even though the software vulnerabilities can not be hidden forever. Attackers can take the control of the software and can control the entire network.
  • The high bandwidth can open the network to a higher number of risk vectors and initiate more vulnerabilities because network monitoring is not easy in a high-speed network. The high speed and volume will make news challenges for Security teams to fight against viruses, hacking, and other possible threats.
  •  Because of the decentralized nature of 5G networks, there are many traffic routings point to monitor. The security teams cannot give a 100% guarantee about the security of an enterprise until all of these endpoints are closely monitored.
  • With the expansion of IoT technology, lots of smart devices have come to the market targeting normal users. These smart devices are easily hackable and also, they are interconnected. Since these smart devices are used in many industries such as Healthcare, transportation, education, power supplies, etc. huge disasters could be done by hacking a small smart device.

References

https://www.tripwire.com/

https://www.qualcomm.com/


 

 


Comments

  1. Informative article Suranga.You have explained about 5G and is there any relation between 5G technology and Wi-Fi?

    ReplyDelete
    Replies
    1. 5G and 5 GHz Wi-Fi are both used for wireless connectivity, and there is nothing in common than this between them. Anyone referring to “5G Wi-Fi” actually means 5 GHz Wi-Fi, which is different from the 5G cellular standard.
      You can read more from the below link:
      https://www.howtogeek.com/398620/whats-the-difference-between-5g-and-5ghz-wi-fi/

      Delete
  2. Informative article Suranga. It is good to aware about the latest threat with the 5G network.

    ReplyDelete

Post a Comment

Popular posts from this blog

What is Software-Defined Networking (SDN) ?