You are on page 1of 7

Name of the University

Assignment Name

Assignment ID

1
Student Name

Student ID

Abstract

The 4G and 5G cellular networks are considered very effective due to higher bit rates which
is more then 10 gigabits per second and capacity as well as lower latency. However, their
protection have become major concerns. The paper represents different surveys on existing
privacy and authentication schemes for 4G and 5G cellular network. There are several types
of threat models used in 4G and 5G cellular networks divided into attacks against privacy,
attacks against integrity, attacks against availability, and attacks against authentication. In
addition to this, countermeasures for increasing cellular network security three categories are
included cryptography methods, humans’ factors, and intrusion detection methods. The
security schemes are helpful to protect the information transferred from 5G cellular network.
Thus, major privacy parameters discussed included authenticating with privacy, RFID
authentication, deniable authentication with privacy, mutual anonymity, key agreement with
privacy, as well as three-factor authentication.

2
Introduction

4G and 5G cellular networks have been increasing and expanding every day. The next
generation wireless networks have been adopted since the inception of wireless and network
technologies including virtualization and software-defined networking [1]. Furthermore, the
integration of 5G technology with internet of things could create many services; for example,
blockchain based services, fog computing, car-to-car communications, smart grid, smart
parking, data networking, and unmanned aerial vehicle [2]. However, quality of service could
get affected as 5G environment is IP based for vulnerabilities are extremely common. Some
of them precisely included access control, security for communication, data confidentiality,
availability and privacy [3]. For this purpose, the paper reviews the selected article and
present review on different privacy frameworks for 5G cellular network.

Literature Review

3
5G Security Issues

5G networks requires a higher level of security and privacy due to interconnection of mobile
devices and successful deployment process. The mobile devices get connected on network all
the time due to which social nodes are made. However, these nodes could be easily tracked
and becomes easy targets through impersonation, eavesdropping, man-in-the-middle, denial-
of-service, replay and repudiation attack [4]. Another important aspect is to maintain proper
quality of service with delay, volume, security, privacy and malicious file through mobile
devices.

5G Threat Models

According to selected article, 5G cellular network threat are being categorized into four
groups including attacks against privacy, integrity, availability and authentication. According
to previous research, the 5G architecture is concerned with security problems. For example,
5G technology does not have solid security architecture; solution to connect with
communication network as well as user security parameters are not properly updated due to
operating roaming of networks; as well as absence of security measures to manage operating
system, applications and data configurations [5].

The security attacks for 5G cellular network is categorized into passive and attacks. The
passive attack occurs whenever information of user is used in unauthorized manner; whereas,
active attacks interrupt communication of users by altering [6]. Some of common active
attacks on 5G network included Distributed Denial 0f Service (DDoS) Attack, Denial of
Service (DoS) Attack and Man in The Middle (MITM) Attack as well as passive attacks
included violation of user’s privacy and Data Confidentiality.

5G Countermeasures

There are several types of countermeasures described for providing security and privacy in
5G technology. First of cryptographic method is described which offers authentication and
privacy preserving scheme. It is classified into three categories such as public key
cryptography, symmetric-key cryptography, and unkeyed cryptography [7]. Furthermore,
scheme uses public key infrastructure to protect information. On the other hand, quantum
cryptography is also developed to support 5G privacy process by using information exchange
and stream generation of bits. As per report, quantum cryptographic provides detection of any
hack in eavesdropping to determine Quantum Bit Error Rate (QBER) error and final secret

4
key reset [8]. The authors have also described another countermeasure including human
based for determine authentication process. The human factor included password, personal
identification number, token, smart cards, passcodes, biometrics like fingerprints signature
[9]. The human factor-based methods are responsible for keeping information safe by taking
major changes into the consideration to protect information. Lastly, intrusion detection
methods are also implemented as second stage of defence as countermeasure. The intrusion
detection will offer to save network intrusion with bypassing and selecting legal network
entity.

Evaluate

The wireless technology such as 5G cellular network requires more capacity and works as
key driver for mobile network. To operate data intensive applications, 5G wireless network
have become considered as effective framework. For example, 5G maintains connectivity and
coverage and data rate of 1Gbps. Secondly, requirement for latency should also be
established so that data rate easily delivers information towards destination in given span. For
the 5g network, connected devices should work properly and implement 100-time data rate as
compared to 4G network. The wireless technology in 5G gets improved after implemented of
energy and cost efficiency model. The 5G wireless network performance could be increased
through cost and higher energy efficiency modelling. The multiple radio access technologies
are also helpful as it provides better communication channel due to development on existing
wireless technologies including the Global System for Mobile Communications (GSM), third
generation of mobile communications (3G), high-speed packet access (HSPA), long term
evolution (LTE), long term evolution advanced (LTE-A), and wireless fidelity (WiFi).
Therefore, after evaluation it is clear that information delivered requires more privacy and
security protection.

Conclusion

On a closing note, security and privacy have become a topmost priority of the 4G and the 5G
cellular network. The 5G is a wireless network technology which is very helpful for using it
in different frameworks. However, lack of security and privacy could make it difficult to
operate. It also impacts the overall network performance and thus require better
countermeasure technique. With this research paper, it was identified that security and
privacy attacks could make it difficult for the communication to take place properly.
Therefore, with help of this paper, it was found that countermeasures could increase multiple

5
benefits. For example, it improves the data rate, latency, and energy efficiency as well as
operations on connected devices.

References
[1]S. Satrusallya, "Design of an Array Antenna for Next Generation Wireless
Network", Journal of Advanced Research in Dynamical and Control Systems, vol. 12,
no. 4, pp. 311-319, 2020. Available: 10.5373/jardcs/v12sp4/20201494.

[2]R. Vannithamby and S. Talwar, Towards 5G: Applications, requirements and candidate


technologies, 1st ed. 2017.

[3]K. Cengiz and M. Aydemir, "Next-Generation Infrastructure and Technology Issues in 5G


Systems", Journal of Communications Software and Systems, vol. 14, no. 1, 2018.
Available: 10.24138/jcomss.v14i1.422.

[4]H. Lu and J. Li, "Privacy-preserving authentication schemes for vehicular ad hoc


networks: a survey", Wireless Communications and Mobile Computing, vol. 16, no. 6,
pp. 643-655, 2014. Available: 10.1002/wcm.2558.

[5]I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of


5G Security Challenges and Solutions", IEEE Communications Standards Magazine,
vol. 2, no. 1, pp. 36-43, 2018. Available: 10.1109/mcomstd.2018.1700063.

[6]S. Bendale and J. Rajesh Prasad, "Security Threats and Challenges in Future Mobile
Wireless Networks", 2018 IEEE Global Conference on Wireless Computing and
Networking (GCWCN), 2018. Available: 10.1109/gcwcn.2018.8668635 [Accessed 26
April 2021].

[7]S. Hakeem and H. Kim, "Multi-Zone Authentication and Privacy-Preserving Protocol


(MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X", Sensors, vol. 21, no.
2, p. 665, 2021. Available: 10.3390/s21020665.

[8]X. HU, C. LIU, S. LIU, J. LI and X. CHENG, "A Vulnerability in 5G Authentication


Protocols and Its Countermeasure", IEICE Transactions on Information and Systems,
vol. 103, no. 8, pp. 1806-1809, 2020. Available: 10.1587/transinf.2019fol0001.

[9]R. R and D. Das, "A Review on 3GPP 5G Security Aspects", Advanced Computing and
Communications, 2019. Available: 10.34048/acc.2019.2.cf.

6
7

You might also like