Security in 5G Networks -- How 5G networks help Mitigate Location Tracking Vulnerability
- URL: http://arxiv.org/abs/2312.16200v1
- Date: Sat, 23 Dec 2023 03:38:28 GMT
- Title: Security in 5G Networks -- How 5G networks help Mitigate Location Tracking Vulnerability
- Authors: Abshir Ali, Guanqun Song, Ting Zhu,
- Abstract summary: Previous generation cellular networks do not enforce any encryption on this information transmitted during this process.
This paper investigates this problem in great detail and discusses how a newly introduced approach in 5G networks is helping combat this problem.
- Score: 4.424739166856966
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As 5G networks become more mainstream, privacy has come to the forefront of end users. More scrutiny has been shown to previous generation cellular technologies such as 3G and 4G on how they handle sensitive metadata transmitted from an end user mobile device to base stations during registration with a cellular network. These generation cellular networks do not enforce any encryption on this information transmitted during this process, giving malicious actors an easy way to intercept the information. Such an interception can allow an adversary to locate end users with shocking accuracy. This paper investigates this problem in great detail and discusses how a newly introduced approach in 5G networks is helping combat this problem. The paper discusses the implications of this vulnerability and the technical details of the new approach, including the encryption schemes used to secure this sensitive information. Finally, the paper will discuss any limitations to this new approach.
Related papers
- SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks [2.5554069583567487]
We study existing privacy and security attacks in pre-5G networks, analyzing the weaknesses that lead to these attacks.
We study the security characteristics of 5G up to the new Release 19, and examine mitigation mechanisms of 5G to the identified pre-5G attacks.
arXiv Detail & Related papers (2024-09-10T09:30:37Z) - Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience [7.816521719452984]
Introducing Small Cell Networks (SCN) has significantly improved wireless link quality, spectrum efficiency and network capacity.
This work proposes a secure privacy-preserving universal HO scheme ($UniHand$) for SCNs in 5G mobile communication.
arXiv Detail & Related papers (2024-03-12T16:56:31Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - SqueezerFaceNet: Reducing a Small Face Recognition CNN Even More Via
Filter Pruning [55.84746218227712]
We develop SqueezerFaceNet, a light face recognition network which less than 1M parameters.
We show that it can be further reduced (up to 40%) without an appreciable loss in performance.
arXiv Detail & Related papers (2023-07-20T08:38:50Z) - Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems [5.918387680589584]
5G networks have transitioned to software-defined infrastructures.
New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition.
This article presents a comprehensive security analysis framework for the 5GCN.
arXiv Detail & Related papers (2021-08-07T20:07:08Z) - Transfer Learning for Future Wireless Networks: A Comprehensive Survey [49.746711269488515]
This article aims to provide a comprehensive survey on applications of Transfer Learning in wireless networks.
We first provide an overview of TL including formal definitions, classification, and various types of TL techniques.
We then discuss diverse TL approaches proposed to address emerging issues in wireless networks.
arXiv Detail & Related papers (2021-02-15T14:19:55Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z) - Blockchain-based Privacy Preservation for 5G-enabled Drone
Communications [47.852641639155664]
5G-enabled drones have potential applications in a variety of both military and civilian settings.
There are security and privacy considerations underpinning 5G-enabled drone communications.
We will review existing blockchain-based solutions after introducing the architecture for 5G-enabled drone communications and blockchain.
arXiv Detail & Related papers (2020-09-07T15:27:52Z) - 5G Security and Privacy: A Research Roadmap [24.802753928579477]
5G - the latest generation of cellular networks - combines different technologies to increase capacity, reduce latency, and save energy.
We outline recent approaches supporting systematic analyses of 4G LTE and 5G protocols and their related defenses.
arXiv Detail & Related papers (2020-03-30T16:36:43Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.