Professional Documents
Culture Documents
At T and 5g Security Issues
At T and 5g Security Issues
Nickolas Cuddie
Dr.Shelly Bartoski
Table of Content
Abstract
5G, the newest advancement in cellular networks. One might ask what is 5G and what are the
security issues that are associated with it and how do these security issues affect businesses like
AT&T. This paper will cover the history of AT&T. Along with that this paper will also be
discussing 4G network and protection, 5G network and security issues, the connection between
4G and 5G which will be followed by a survey and will end with a discussion about how 5G
security issues affect businesses like AT&T. In the end AT&T, and similar businesses, are
affected a lot by security issues. The security issues that AT&T and similar businesses will have
to face are advancing technologies and security threats, security software that underperforms due
to the amount of technology that exist, cybercriminals, technology exploits, and various other
Technology, it is everywhere and is used by almost everyone. One of the most common
pieces of technology is cellphones. Cell phones are primarily used for communicating with
people and searching the web. The introduction of the 5G network will change how people use
the internet on their phones. Not only does 5G change how people surf the web on their phones it
also introduces a security issues. This paper will talk about the security issues that are presented
with 5G along with how businesses like AT&T are affected by the security risk presented with
5G. This paper will start with the history of AT&T followed by the security issues presented
with 4G and how the security issues with 5G are different compared to those that are presented
with 4G. After discussing the security risk presented with 5G and how it compares or differs to
the security risk that was presented with 4G the paper will then discuss how the security risk of
5G will be dealt with. A study will also be done to see what people think of the security risk
presented with 5G. The Survey will be done in person and be sent out in a Google form to see
what people think of the security risk and what they think is different between 4G and 5G. When
it comes down to data speeds 5G is the newest that there is and there are security issues that
come along with it. How do businesses like AT&T deal with the security issues that are
Literary Review/Background
AT&T History
Before diving into understanding the security issues presented with 5G lets look into
what AT&T is. AT&T stands for American Telephone and Telegraph (The Free Dictionary).
AT&T was founded a hundred and fourty years ago when Alexander Gram bell created the
telephone. That means that AT&T is the first “modern media company”(AT&T). During its
AT&T and 5G Security Issues 5
existence AT&T has worked with WarnerMedia and in 1920 both companies created the first
talking movie The Jazz Singer (AT&T). AT&T has also helped in creating the TV channel HBO
and the news channel CNN (AT&T). Their purpose is to bring connectivity, entertainment, news,
and more to their customers around the world (AT&T). This is just a brief history into AT&T,
Up until 5G networking was released the network that people relied on was 4G. 4G
stands for fourth generation technology (Nidhi & Nandal,2017). This network, just like 5G, had
security issues. One note to make when looking at the issues is that there is security software and
systems in place to protect the network does not mean that the security issues go away, any piece
of technology is always susceptible to a hack or some type of security issue and that the security
system and software that is in place is there to protect or reduce the impact of a hack or security
issue. One security issue that 4G had was a wifi security vulnerability. The vulnerability was that
text font was changing during coding and decoding (Nidhi & Nandal, 2017). Another security
issue that 4G had was people attacking the system. Nidhi & Nandal say that there are two types
of attacks and that the attacks are identified as either a passive attack or a active attack (Nidhi &
Nandal, 2017). Nidhi and Nandal also say in their article that LTE stands for Long Term
Evolution (Nidhi & Nandal, 2017). Nidhi and Nandal talk about how hackers, by either active or
passive attacks, will either go after what they are looking for by attacking, as Nidhi and Nandal
define as, either the physical layer or Mac layer (Nidhi & Nandal, 2017). One might think that
there are ways to deal with or fix the security issues with 4G and there is.
There are security systems and algorithms in place to make sure that 4G isn’t susceptible
to an attack or a previous security issue. Alas the issue with these systems and algorithms is that
AT&T and 5G Security Issues 6
they do not fully protect 4G but rather reduce the risk of an attack or security issue (Mathi,S et
al.,2017). The article “Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault
Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks” talks about
a couple of ways to improve the security system in place and increase the efficiency of the
systems. One of the current ways that 4G data speeds are being protected is by three sets of
cryptographic algorithms (Mathi,S et al.,2017). Each of the three algorithms are a combination of
EEA and EIA algorithms (Mathi,S et al.,2017). The article “Integrating Non-linear and Linear
Security of 4G-LTE Networks” says that the first algorithm is called 128-EEA1/128-EIA. The
second algorithm is called 128-EEA2/128-EIA2. The third and final algorithm that the article
identifies is called 128-EEA3/128-EIA3(Mathi,S et al.,2017). The first set, as the article likes to
call it, is based on what is called a snow 3G algorithm where as the second one is based on AES
algorithm, and the third is based on a ZUC Algorithm (Mathi,S et al.,2017). algorithms work to
protect 4G but do not offer full protection against or fully solve the security issues. The article
that talks about the above algorithms also discusses how to improve the effectiveness of the
algorithms so that they can provide better security. In summary the article used two types of
inputs, which consist of a faulty cypher text and a fault free cypher text. The information that
comes from the inputs, the output, get put into a linear diffusion function after a certain number
of times, the article calls each time the linear diffusion function happen a round, the function
would then feed that information or “falt” would be placed into a state matrix (Mathi,S et
al.,2017). The article tested a combination of the cyphers and linear, or nonlinear, functions with
an AES algorithm as a improved data security. The test proved that newer algorithm offered
better protection over the current security (Mathi,S et al.,2017). Even though the algorithms
AT&T and 5G Security Issues 7
mentioned above sound like they are fully taking care of the security issues with 4G but they are
not.
Besides having a combined, or hybrid, algorithm above there are also other ways to
improve the security for 4G data speeds. The article Network Separation and IPSec Ca
Certificates-Based Security Management for 4G Networks talks about how there is some type of
hierarchy structure setup within the security systems that protect 4G (Kowtarapu, C et al., 2009).
The article proposes that the hierarchy be made bigger and have more shells in them while also
having a Hierarchy set up for both IPsec and VlAN so that there are multiple hierarchies which
are supposed to, as the authors of the article suggest, is to meet the needed security for any
network (Kowtarapu, C et al., 2009). Another way to protect 4G networks is to have network
separation. The network separation makes sure that the network isn’t congested, that data goes
where it is supposed to go, isolates any traffic path if and when needed, and lowers the risk
against certain types of attacks like, and as what the authors like to call, flood attacks
(Kowtarapu, C et al., 2009). Even though the security for 4G is being improved technology has
The new data speed is known as 5G. 5G stands for fifth generation and is the newest
generation of network (Hussain,R et al. 2019). Just like 4G, and networks before 4G, 5G has
security issues. With 5G being the newest network available, it will be and is more prone to
attacks (Hussain,R et al. 2019). Huawei Technologies, a tech business known for its cellphones
and security, is one example of how a business is adjusting to 5G. The issue that Huawei is
facing is they are being questioned, and is under trial, for their security standards (Pratt, M. K.,
2019). So not only is this business facing newer security issues they are also facing external
AT&T and 5G Security Issues 8
issues. The external issues consist of a ban of their products in the U.S., and potentially Canada,
along with being questioned for their security, influence from governments, and are having to
meet governmental standards for 5G security (Pratt, M. K., 2019). As stated above there are
security issues with 5G. Some of these security issues are similar to the security issues with 4G
in which these similar security issues will be discussed later. With 5G being released to the
public shows that there is already some type of security in place to protect those that are already
using 5G. A article called “Integration of VANET and 5G Security: A review of design and
implementation issues” discusses various security issues and solutions. The research of the
article also looks into 5G vehicular networks (Hussain,R et al. 2019). Technology has advanced
to the point to where data networks are used beyond cellphones. That means that security issues,
So there are a lot of security issues that come with 5G networks. The best way, and
simplest way, to say the security issues are is that 5G network and anything associated with it
can be exploited and be hacked, damaged, or compromised in one way or another (Hussain,R et
al. 2019). Some of the more common types of attacks are proliferation, jamming, sybil attacks,
malware, integrated attacks, and, DDoS, which stands for distributed denial of service
(Hussain,R et al. 2019). These attacks trick, deceive, block, spy, or do anything else that the
person in charge of the attack wants (Hussain,R et al. 2019). These security issues, or attacks, are
also present in any vehicle or technology that uses a 5G, or similar, network (Hussain,R et al.
2019). One of the ways that security issues are being dealt with is by security software. The
security software, just like the security issues, have specific purposes and protect anything and
everything (Hussain,R et al. 2019). The website/article “Guest Editorial Physical Layer Security
for 5G Wireless Networks, Part I” is a prime example of some of the ways that technology can
AT&T and 5G Security Issues 9
be hacked. The article consist of 19 papers and each paper talks about a certain way that a
cellular network can be hacked and offer a solution as to how the vulnerability, or security issue,
can be potentially be protected (Wu, Y et al., 2018). The research performed in these papers
further show that there are a lot of security issues and flaws that can be exploited if not taken
care of. Some of the security methods mentioned in the article “Guest Editorial Physical Layer
Security for 5G Wireless Networks, Part I” and not in any of the other sources are hybrid
security programs, ease dropping protection software, and polar coding. Some of the security
issues mentioned are ease dropping programs and spoof attacks (Wu, Y et al., 2018). One might
think that once security is in place that all of the security issues are taken care of but that is not
the case. There are two main factors that cause the security issues to change, technology and
hackers. Both are constantly changing. So when both change the security is not performing at
As networks advance, in both security and security issues, one might think that there are
no security connections between one data generation and the next. Some of the security issues
that exist between 4G and 5G are DoS, also usknown as Denial of Service, forgery attacks, and
authentication and privacy-preserving schemes” say that there are fourteen other
security issues that exist between 4G and 5G networks (Ferrag, M. A. et al., 2018). Not only
is there some security issues that coexist between 4G and 5G network but there are security
programs in place that protect both networks. The security software consist of intrusion
detection, cryptography, human interaction/factors, and formal and formal techniques (Ferrag,
through cryptology: a case of 4G and 5G LTE cellular network providers” test the protocols of
cryptography to see how well to see how they performed. The results showed that the protocols
performed really well and is a really good security option for 4G and 5G (Manasreh, A. et al.,
2019). Some other security software protection connections through various forms of
authentications with privacy and biometric security (Ferrag, M. A. et al., 2018). All of this
research shows that even though there is security in place for network speeds, no matter if it is
Survey
The research and information above shows that the main security issues are advances in
also created a survey, which was created using Google Survey, for people to fill out to find out
what people think about the security issues of 4G and 5G and to see what they know about 4 and
5G. Originally I planned on putting the survey on the social media site Facebook and go around
CMU and ask students to fill out a physical or electronic version of the survey.Due to the
Corona pandemic, and the events that followed, I ended up using Facebook as the primary way
to get responses to the survey. Besides having the survey online I contacted a couple of friends
and family, via call and/or text, and asked them to complete the survey. Once the survey was
online it was available to be filled out for a period of almost two weeks. The only restrictions
that people had when they filled out the survey was that they had to answer each question and
could only submit a completed survey once. The survey consisted of ten questions in which five
where multiple choice questions and five required a typed response from the people who took the
survey. The questions went in this order, Besides being a cellular data speed, do you know
AT&T and 5G Security Issues 11
anything about 4G and 5G? The question after that was Besides being a cellular data speed, do
you know anything about 4G and 5G? The third question was Do you think that the security
issues are the same between 4G and 5G? Question four was What do you think are the security
issues of 4G are? The following question was What do you think are the security issues of 5G
are? The sixth question that people were asked in the survey was Do you think that the security
issues between 4G and 5G are similar or different? Question seven of the survey was How do
you think the security issues of 4G are being dealt with? The following question was Do you
think that the security that is in place for 4G be used for 5G? Questions nine and ten were Do
you think that the security that is in place for 4G be used for 5G, and How does the security
issues of 5G affect businesses like AT&T? These were the questions that the people of the
survey filled out. As one can see the questions started out asking about 4G networks and then
moved on to 5G and then ended with comparing and contrasting 4G and 5G. The reason I set up
the survey was because I wanted to ask people about a cellular network that people were familiar
with and then go onto asking about the new network,5G, and the security issues that are
associated with that network. I then wanted to ask people to compare and contrast certain
aspects, primarily the security issues and security that is in place, of 4G and 5G. Lastly I wanted
to see how others thought how businesses like AT&T are affected by the security issues of 5G.
Survey Responses
Now knowing what the survey questions are and what the purpose of the survey is lets
now look at the answers. For question one seven out of the eight people responded no while one
person answered yes. For question two six out of the eight people that took the survey responded
with no while the other two people said yes. For question three, half of the group responded with
maybe while the other half responded with no. With question four and five about half said they
AT&T and 5G Security Issues 12
did not know what the security issues with 4 and 5G are while everyone else said data hacking,
data hacking with privacy, and bad guys. For question six one person said that the security issues
between 4 and 5G are the same while everyone else said that they did not know. For question
seven about half the survey group chose to answer with some form of I don’t know while
everyone else said that 4G security issues can be dealt with firewalls, better security, tech
support, and by taking care of the issue yourself. Question eight was the last multiple choice
question and seventy-five percent of the study group said no to the security that is in place for 4G
be used for 5G while the other twenty-five percent said yes. For question three people responded
with I don’t know while everyone else gave an answer to why is security important for 5G. The
responses, besides the three I don’t know answers, said to keep up with technology, to protect
users, bad people will be bad, and personal privacy. The last question asked the survey group
how the security issues with 5G affect businesses like AT&T. About half went with the answer
of I don’t know while the others said lawsuits, data taping and mining, and that the security
issues can trickle down and affect the customers of AT&T. The responses to the questions
Discussion
Between the survey and the research I was able to find out how businesses like AT&T are
affected by the security issues of 5G. The research proved that technological advancements are a
major factor for the security issues. The technological advancements make it where security
software is not working at peak performance which then in turn makes AT&T and similar
businesses more vulnerable to attacks. The research also showed that there is not enough security
in place which means that AT&T is not putting enough protection in place to protect itself from
an attack. The survey showed that people don’t have a proper understanding of what goes on
AT&T and 5G Security Issues 13
with protecting their devices and are putting themselves at a risk because of this
misunderstanding. Due to this lack of understanding a person can end up doing something
horrible unintentionally and have it where their information is hacked. The same can go for
businesses like AT&T. AT&T has to deal with governmental and outside regulations/standard,
external forces, and other issues on top of protecting their customers and their own information.
AT&T, in the case that they get hacked or don’t follow the government regulation, can get sued
or fined because they failed to protect themselves against the security issues of 5G, or another
network, or have the proper security in place. Another reason why AT&T is affected by 5G is
due to the fact that 5G is relatively new and they will have to adjust to the newer network and its
issues while still maintaining 4G and other networks. These are all of the different things that
businesses like AT&T have to deal with when it comes to the issues associated with 5G.
Conclusion
When looking at 5G and the security issues that it has and seeing how these issues affect
businesses like AT&T one must understand the history of AT&T along with the history of 4G
and 5G along with understanding what both are. On top of that people must understand that there
are security issues associated with 4G and 5G, what they are, and how they are taken care of. In
the end 5G is the newest generation of cellular networking and is being implemented in
businesses like AT&T. These are the security issues of 5G and how they affect businesses like
AT&T.
Reflection
This paper has shown me that there are a lot of details and issues that come up with
protecting a network. I plan on going into cybersecurity once when I am done with college. I
started this paper thinking that the security/cybersecurity for cellular networks was going to not
AT&T and 5G Security Issues 14
have as many threats when compared to all the technology exist. I found out that cellular
networks need just as much protection if not more protection then all other technology. Even
though I am planning on going into cybersecurity I do not plan on working for AT&T. The
reason why is due to them mainly being a technology, mainly phones, and network provider.
With my degree I don’t want to be a person who sells phones, or other tech, and be the I.T. guy
that knows how to fix it. I want to be in the job where I am protecting a persons and businesses,
which includes AT&T, online data and information and make sure that information doesn’t fall
into the wrong hands. On top of that I want to be able to help reduce the gap between the security
software that exist and the actual amount security needed to protect the information that needs to
be protected. The research that I have preformed for this paper shows that there is a huge need
for people who specialize in cybersecurity and that this field is constantly changing due to newer
and better security coming out. The research also shows how much people don’t know that much
about the security issues and security that is needed for technology. This information shows that
there is a high demand for the people in this field and that the field of cybersecurity plays a huge
factor in the realm of technology. This paper has furthered my interest and desire to go into the
field of cybersecurity.
AT&T and 5G Security Issues 15
References
AT&T Official Site - Unlimited Data Plans, Internet Service, & TV. (n.d.). Retrieved from
https://www.att.com/?
source=EGOOTMKINFBNDDSKP&WT.srch=1&wtExtndSource=at&t&gclsrc=aw.ds&
ds_rl=1271035&gclid=CjwKCAiA-
vLyBRBWEiwAzOkGVGKTY7drtGgyCeOT7wHRSiio8yWZjQvNXmQyta_x2ed-
HxvJa-bJ9hoCNH8QAvD_BwE
Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. (2018). Security for 4G
org.cmich.idm.oclc.org/10.1016/j.jnca.2017.10.017
Hussain, R., Hussain, F., & Zeadally, S. (2019). Integration of VANET and 5G Security: A
review of design and implementation issues. Future Generation Computer Systems, 101,
843–864. https://doi-org.cmich.idm.oclc.org/10.1016/j.future.2019.07.006
Kowtarapu, C., Anand, C., & Guruprasad, K. G. (2009). Network Separation and IPsec CA
Manasreh, A., Sharadqh, A. A. M., Alkasassbeh, J. S., & A1l-Qaisi, A. (2019). Ensuring
org.cmich.idm.oclc.org/10.11591/ijece.v9i6.pp4860-4865
AT&T and 5G Security Issues 16
Mathi, S., Kalyaan, P., S., K., & S., B. (2017). Integrating Non-linear and Linear Diffusion
org.cmich.idm.oclc.org/10.14429/dsj.67.10118
Nidhi, & Nandal, V. (2017). An Overview of the Attacks on Lte in 4G: Exploiting the Security.
https://doi-org.cmich.idm.oclc.org/10.26483/ijarcs.v8i9.5150
Pratt, M. K. (2019). Huawei ban highlights 5G security issues CISOs must tackle. Information
Security, 20(2), 3.
Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K.-K., & Gao, X. (2018). Guest Editorial Physical
Layer Security for 5G Wireless Networks, Part I. IEEE Journal on Selected Areas in
org.cmich.idm.oclc.org/10.1109/JSAC.2018.2832378