5G Attacks and Countermeasures

Sebastian Angelo Bjerre, Mikkel Wøidemann Klæbel Blomsterberg, Birger Andersen

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1197 Downloads (Pure)

Abstract

With the arrival of the fifth generation of mobile networking technology, 5G, subscribers and IoT devices can look forward to higher data transfer rates, lower latency, better reliability, and increased availability. Deploying this new infrastructure in conjunction with the previous generations of networks will expand the threat surface. In this article, we will be exploring the architecture of the 5G architecture and give an overview of the different types of security vectors and how to possibly mitigate the attacks. Through our research, we found that vulnerabilities must be addressed at every level within the infrastructure of the 5G network. While the 5G network has increased in complexity and separated services dependencies from one another, maintaining and patching a service has been made easier. From a security perspective, this study emphasizes how mobile network technologies are receptive to threats and the need for mitigation methods is a high priority.
Original languageEnglish
Title of host publicationProceedings of 25th International Symposium on Wireless Personal Multimedia Communications
Number of pages8
PublisherIEEE
Publication date2023
ISBN (Electronic)978-1-6654-7318-7
DOIs
Publication statusPublished - 2023
Event25th International Symposium on Wireless Personal Multimedia Communications - Herning, Denmark
Duration: 30 Oct 20222 Nov 2022
Conference number: 25
https://btech.au.dk/wpmc-2022

Conference

Conference25th International Symposium on Wireless Personal Multimedia Communications
Number25
Country/TerritoryDenmark
CityHerning
Period30/10/202202/11/2022
Internet address
SeriesIEEE Symposium on Wireless Personal Multimedia Communications (WPMC)
ISSN1882-5621

Keywords

  • 5G
  • Security
  • Attack vectors
  • Countermeasures

Fingerprint

Dive into the research topics of '5G Attacks and Countermeasures'. Together they form a unique fingerprint.

Cite this