5G Network Security Practices: An Overview and Survey
- URL: http://arxiv.org/abs/2401.14350v1
- Date: Thu, 25 Jan 2024 17:54:45 GMT
- Title: 5G Network Security Practices: An Overview and Survey
- Authors: Fatema Bannat Wala, Mariam Kiran,
- Abstract summary: This document provides an overview of 5G network security, describing various components of the 5G core network architecture and what kind of security services are offered by these 5G components.
It also explores the potential security risks and vulnerabilities presented by the security architecture in 5G.
- Score: 0.10742675209112622
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This document provides an overview of 5G network security, describing various components of the 5G core network architecture and what kind of security services are offered by these 5G components. It also explores the potential security risks and vulnerabilities presented by the security architecture in 5G and recommends some of the best practices for the 5G network admins to consider while deploying a secure 5G network, based on the surveyed documents from the European government's efforts in commercializing the IoT devices and securing supply chain over 5G networks.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Advanced Penetration Testing for Enhancing 5G Security [0.0]
This paper reviews penetration testing approaches for identifying security vulnerabilities in 5G networks.
It examines ways adversaries exploit vulnerabilities in 5G networks, covering tactics and strategies targeted at 5G features.
Our research indicates that 5G penetration testing should use a multithreaded approach for addressing current security challenges.
arXiv Detail & Related papers (2024-07-24T13:35:35Z) - Establishing Trust in the Beyond-5G Core Network using Trusted Execution Environments [4.235733335401408]
We review the security implications introduced in B5G networks, and the security mechanisms that are supported by the 5G standard.
We propose a vertical extension of Zero Trust, namely, Zero Trust Execution, to model untrusted execution environments.
We provide an analysis on how to establish trust in Beyond-5G network architectures using Trusted Execution Environments.
arXiv Detail & Related papers (2024-05-20T17:02:18Z) - Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments [60.51751612363882]
We investigate the security implications of and software-based Open Radio Access Network (RAN) systems.
We highlight the presence of potential vulnerabilities and misconfigurations in the infrastructure supporting the Near Real-Time RAN Controller (RIC) cluster.
arXiv Detail & Related papers (2024-05-03T07:18:45Z) - Penetration Testing of 5G Core Network Web Technologies [53.89039878885825]
We present the first security assessment of the 5G core from a web security perspective.
We use the STRIDE threat modeling approach to define a complete list of possible threat vectors and associated attacks.
Our analysis shows that all these cores are vulnerable to at least two of our identified attack vectors.
arXiv Detail & Related papers (2024-03-04T09:27:11Z) - Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid [0.0]
A smart grid (SG) requires a prompt and dependable connection to provide real-time monitoring through the IoT.
5G could be considered a catalyst for upgrading the existing power grid systems.
This article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
arXiv Detail & Related papers (2022-10-04T16:57:33Z) - Machine Learning Assisted Security Analysis of 5G-Network-Connected
Systems [5.918387680589584]
5G networks have transitioned to software-defined infrastructures.
New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network (5GCN) architecture to enable this transition.
This article presents a comprehensive security analysis framework for the 5GCN.
arXiv Detail & Related papers (2021-08-07T20:07:08Z) - To Talk or to Work: Energy Efficient Federated Learning over Mobile
Devices via the Weight Quantization and 5G Transmission Co-Design [49.95746344960136]
Federated learning (FL) is a new paradigm for large-scale learning tasks across mobile devices.
It is not clear how to establish an effective wireless network architecture to support FL over mobile devices.
We develop a wireless transmission and weight quantization co-design for energy efficient FL over heterogeneous 5G mobile devices.
arXiv Detail & Related papers (2020-12-21T01:13:44Z) - True-data Testbed for 5G/B5G Intelligent Network [46.09035008165811]
We build the world's first true-data testbed for 5G/B5G intelligent network (TTIN)
TTIN comprises 5G/B5G on-site experimental networks, data acquisition & data warehouse, and AI engine & network optimization.
This paper elaborates on the system architecture and module design of TTIN.
arXiv Detail & Related papers (2020-11-26T06:42:36Z) - A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From
Communications to Sensing and Intelligence [152.89360859658296]
5G networks need to support three typical usage scenarios, namely, enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC)
On the one hand, UAVs can be leveraged as cost-effective aerial platforms to provide ground users with enhanced communication services by exploiting their high cruising altitude and controllable maneuverability in 3D space.
On the other hand, providing such communication services simultaneously for both UAV and ground users poses new challenges due to the need for ubiquitous 3D signal coverage as well as the strong air-ground network interference.
arXiv Detail & Related papers (2020-10-19T08:56:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.