Security For 5G and Beyond
Security For 5G and Beyond
Presented by
Jeonghun Cha
1
INDEX
1. Introduction
2. Related Work
3. Security in Wireless Networks: From 1 to 4G
4. Security in 5G: An Overview
5. Security in 5G Network: Challenges and Solutions
6. Security in key 5G technologies
7. Privacy Challenges and Solutions
8. New Dimensions in Security Fut. Net.: The XG
9. Conclusion
1. Introduction
❑ The 5G wireless networks will provide very high data rates and higher coverage
with significantly improved Quality of Service (QoS), and extremely low latency
❑ 5G will connect nearly all aspects of the human life to communication networks
1. Introduction
❑ With all these capabilities, 5G will connect nearly all aspects of the human life to
communication networks, and this underscores the need for robust security
mechanisms across all network segments of the 5G.
1. Introduction
❑ The security solutions and architectures used in previous generations (i.e. 3G and
4G), apparently, will not suffice for 5G
❑ The main reason for new security solutions and architecture is the dynamics of
new services and technologies in 5G
1. Introduction
❑ there are new technological concepts or solutions that will be used in 5G to meet
the demands of increasingly diverse applications and connected devices
❑ the core network entities such as Home Subscriber Server (HSS) and Mobility
Management Entity (MME) that hold the user billing, personal, and mobility
handling information, respectively, deployed in clouds will render the whole
network ineffective if security breaches occur
❑ These controllers will be the favorite choice for attackers to render the whole
network down through Denial of Service (DoS) or resource exhaustion attacks
1. Introduction
❑ It starts off with a dive into the security challenges and corresponding solutions
for the previous generations of networks ranging from 1G to 4G
❑ The vision of 5G lies in providing very high data rates (Gigabits per second),
extremely low latency, manifold increase in base station density and capacity, and
significant improvement in quality of service, compared to 4G systems
❑ The concerns related to security, indirectly if not directly effecting it, pertaining
to 4G are the lack of mechanisms to support data traffic bursts, limited processing
capabilities of base stations, and latency
❑ These limitations, if not removed, will make the network prone to security
challenges
2. Related Work
❑ the survey article [11] provides some interesting insights on the limitations of the
current 4G networks that must be solved in 5G
❑ Security challenges and the possible mitigation techniques in the wireless air
interfaces are discussed in [19]
❑ The article considers various wireless access technologies such as Bluetooth,
Wi-Fi, WiMAX and LTE, and discusses the inherent security limitations and
future directions for strengthening the security of each technology
❑ Therefore, this article also discusses the future of security in environments replete
with massive IoT, such as smart cities
3. SECURITY IN WIRELESS NETWORKS: FROM 1G TO 4G
❑ The 1G cellular systems used analog signal processing and were designed
primarily for voice services
❑ This advance phone service did not use encryption and thus there was no security
of information or telephone conversations
❑ Hence, practically the whole system and users were open to security challenges
such as eavesdropping, illegal access, cloning, and user privacy [4], [32]
3. SECURITY IN WIRELESS NETWORKS: FROM 1G TO 4G
❑ Global System for Mobile (GSM) communication became the most successful
and widely used standard in cellular communications as part of 2G cellular
networks
❑ The signalling and user data protection was carried out through encryption in
which the Subscriber Identity Module (SIM) played an important role in the
encryption keys.
❑ The 3G cellular networks were developed primarily to provide higher data rates
than 2G networks.
❑ The Evolved Packet System-AKA (EPS-AKA) had one major enhancement over
UMTS-AKA which is called cryptographic network separation.
The Evolved Packet System-AKA (EPS-AKA)
User ID Request
UE : User Equipment
eNB : eNodeB (based station)
MME : Mobility Management Entity
HSS : Home Subscriber Server
4. SECURITY IN 5G: AN OVERVIEW
❑ Flash network traffic: It is projected that the number of end user devices will
grow exponentially in 5G that will cause significant changes in the network
traffic patterns either accidentally or with malicious intent
❑ DoS attacks on the Infrastructure: This threat will be more severe due to the
possibility of attacks from machines that are geographically dispersed and are in
huge numbers (compromised IoT)
Fig. 4. Security threat landscape in 5G networks.
4. SECURITY IN 5G: AN OVERVIEW
❑ The vision of secure 5G systems that is outlined by NGMN [7] is based on three
principles. These are: i) flexible security mechanisms, ii) supreme built-in
security, and iii) security automation, as highlighted in Fig. 5
4. SECURITY IN 5G: AN OVERVIEW
❑ With the anticipation of 5G, various actors; even outside the telecom sector such
as automotive are indulging in evaluating the security impacts of 5G
❑ i) access networks :
❑ The current networks are already prone to many Internet-based threats that
can target the access nodes such as eNBs in LTE and low powered access
nodes, as detailed in [68].
❑ For traffic towards the Internet or external network, the eNB sends the traffic
to the serving gateway through GPRS Tunneling Protocol (GTP).
❑ The serving gateway sends the traffic to Public Data Network (PDN)
gateway which communicates with external networks or the Internet.
❑ The core network of LTE or 4G, called EPC, comprised different entities
such as MME, serving gateway, PDN gateway, and HSS [163]
❑ The core network is IP based and ensures end to end service delivery,
security and QoS, and maintains subscriber information
❑ The key idea of massive MIMO is to equip the base station with a large
number of antenna elements that can serve a large number of user terminals
with the same frequency band [3]
❑ In the active eavesdropping, the attacker also transmits signals to disrupt the
legitimate user’s transmission
❑ If the only goal of the active attack is to disrupt the legitimate transmission,
it can be called a jamming attack [183]
❑ 2) Security in SDN :
❑ SDN separates the network control plane from the forwarding plane and
centralizes the network control into softwarebased network control platforms
❑ 2) Security in NFV :
❑ 2) Security in NFV :
❑ 3) Security in Cloud :
❑ 1) Privacy: 1G - 3G :
❑ 3G is observed that they are exposed to various attacks which were mainly
targeting the identity and confidentiality of the subscribers such as IMSI
paging attacks and AKA error message attacks[282], [280]
7. PRIVACY CHALLENGES AND SOLUTIONS
❑ 1) Privacy: 4G :
❑ 4G networks are currently the most widely used mobile networks and have
significant amount of enhancement in terms of data rates compared to the
previous generations
❑ This happens when adversaries set up fake base stations and act as real
network base stations [16]
❑ 1) Privacy: 5G :
❑ Hence, the real benefits of IoT, aiming the smart cities, can be realized when
the communication systems are also smart enough to intelligently and
autonomously deliver the necessary information generated and needed by
IoT [330]
❑ Taking the network functions from software rather than hardware is one of
the key trends in future wireless networks
❑ most of the related work suggest that many of the security frameworks are
based on centralized approaches
❑ For integrating new things (IoT) and services into the network, 5G will use new
technologies such as advanced cloud computing concepts (e.g. MEC), SDN, NFV,
and massive MIMO etc
❑ These technologies have their own inherent security challenges which can further
complicate the network security landscape
Ahmad, Ijaz, et al. "Security for 5G and Beyond." IEEE Communications Surveys & Tutorials (2019).