Abstract
With the arrival of the fifth generation of mobile networking technology, 5G, subscribers and IoT devices can look forward to higher data transfer rates, lower latency, better reliability, and increased availability. Deploying this new infrastructure in conjunction with the previous generations of networks will expand the threat surface. In this article, we will be exploring the architecture of the 5G architecture and give an overview of the different types of security vectors and how to possibly mitigate the attacks. Through our research, we found that vulnerabilities must be addressed at every level within the infrastructure of the 5G network. While the 5G network has increased in complexity and separated services dependencies from one another, maintaining and patching a service has been made easier. From a security perspective, this study emphasizes how mobile network technologies are receptive to threats and the need for mitigation methods is a high priority.
Original language | English |
---|---|
Title of host publication | Proceedings of 25th International Symposium on Wireless Personal Multimedia Communications |
Number of pages | 8 |
Publisher | IEEE |
Publication date | 2023 |
ISBN (Electronic) | 978-1-6654-7318-7 |
DOIs | |
Publication status | Published - 2023 |
Event | 25th International Symposium on Wireless Personal Multimedia Communications - Herning, Denmark Duration: 30 Oct 2022 → 2 Nov 2022 Conference number: 25 https://btech.au.dk/wpmc-2022 |
Conference
Conference | 25th International Symposium on Wireless Personal Multimedia Communications |
---|---|
Number | 25 |
Country/Territory | Denmark |
City | Herning |
Period | 30/10/2022 → 02/11/2022 |
Internet address |
Series | IEEE Symposium on Wireless Personal Multimedia Communications (WPMC) |
---|---|
ISSN | 1882-5621 |
Keywords
- 5G
- Security
- Attack vectors
- Countermeasures