0
5G technology has security protocol weaknesses
2018-11-22T22:29:51.363Z22 November 2018

5G technology has security protocol weaknesses

5G technology will provide ultra-high speeds and almost no delays. Companies especially expect that 5G will allow them to simultaneously run more bandwidth-intensive applications. But you should not ignore security issues.

Problems found in 5G communication standards

A team of researchers from Switzerland, France and the UK have identified problems with the 5G security protocol, known as Authentication and Key Agreement (AKA). The drawbacks were revealed through the use of the Tamarin tool, which is considered the most effective for studying cryptographic protocols. The AKA is a standard to which the developer of the 3rd Generation Partnership Project (3GPP) is involved.

The type of AKA that is connected to 5G must ensure that the device and the 5G network are able to authenticate each other, maintaining confidential data exchange and keeping the user's identity and location secret. However, researchers argue that in its current form, AKA may not perform these functions, since the requirements set out in it are not sufficiently accurate.

The research team is confident that 5G security with AKA will be more reliable than with 3G and 4G network protocols. However, there are drawbacks. In particular, it is possible to detect the location of the phone in a certain area, although without disclosing the owner’s identity. Moreover, due to the AKA vulnerability, it may erroneously be charged for using a 5G network by another user.

Some risks are not yet obvious

5G will allow companies to connect more and more devices with a higher speed of information exchange, so that more data will be consumed in a shorter time, thereby increasing the capabilities of the network and the flow of incoming and outgoing data center data.

So if there is a large number of connected devices and large data streams, more potential vulnerabilities appear due to the increase in the number of new attack vectors. Under such conditions, it becomes more important than ever to have proper monitoring tools, the ability to identify an attack if a criminal has penetrated the network, and the potential to effectively respond and eliminate any potential problem.



Views
3
Shares
0
Comments
0

Comments

Latest news
How to become LIR in 7 days
How to become LIR in 7 days

There is an Internet infrastructure that includes switches, routers, which require a fairly large number of ..

30 August 2018
How to avoid mistakes when choosing a hosting
How to avoid mistakes when choosing a hosting

Everyone says that they learn from mistakes, but sometimes these mistakes can lead to very large losses. The..

17 September 2018
What is the reason for the global increase in the nu..
What is the reason for the global increase in the nu..

In April 2017, there were 320 hyper-scalable data centers in the world, and in December their number was 390..

15 November 2018
Samsung plans to become one of the telecommunication..
Samsung plans to become one of the telecommunication..

Samsung Electronics intends to take advantage of the opportunities that will open after the commercial intro..

27 September 2018

Do you like cookies? 🍪 We use cookies to ensure you get the best experience on our website. By using our website you agree with our policy!

I AGREE