Академический Документы
Профессиональный Документы
Культура Документы
Seminar Presentation
4G Drawbacks
• Complex hardware.
• Connectivity is still limited.
• Have it’s initial glitches and bugs.
• Much poorer battery life on this network.
• Possibility of some interference and it cable of being attacked.
• forced to buy new devices to support 4G.
evolution of 5G
evolution of 5G
• Started from late 2010s
attacks
Attack : Gaining the access of data by unauthorized user.
Types of attacks:
Passive attack: Data is only access by the unauthorized person but not modified the
data.
Active attack: Data can be modified by the 3rd person.
Security attack:
• Eavesdropping
• Jamming
• DoS AND DDoS
• MITM
Eavesdropping
eavesdropping Jamming
Jamming
DoS & DDoS MITM
MITM
• machine used in such attacks are collectively
known as “Botnets”
Security services
Security services
1. authentication
2. confidentiality
3. availability
4. integrity
authentication
authentication confidentiality
4G Drawbacks
• a process that ensures and confirms a user’s • protecting information from being accessed by
identity. unauthorized parties.
• begins when a user tries to access information. • a set of rules that limits access to information.
• the user must prove his access rights and identity. • consists of two aspects, i.e., data confidentiality
and privacy.
confidentiality
• Data encryption is a common method of
ensuring confidentiality.
integrity availability
integrity
• defined as the degree to which a service is
• involves maintaining the consistency, accuracy and accessible and usable to any legitimate users
trustworthiness of data over its entire life cycle. whenever and wherever it is requested.
• Integrity prevents information from being • One of the major attacks is DoS attack.
modified.
integrity
technologies
technologies
1. SDN
2. HetNet
3. D2D
4. massive MIMO
SDN(Software Defined Network)
SDN
• all protocols- specific features are implemented in software.
• Encryption and use of digital signature can be used to prevent attacks such as MITM.
HetNET (Heterogenous Network)
• a network connecting computers and other devices with different OS and protocols.
HetNet
• HetNet achieves higher capacity, wider coverage and better performance in EE and
SE.
D2D
• Cryptography is applied to achieve security requirements.
• method for multiplying the capacity of a radio link using multiple transmission and
massive MIMO
receiving antennas to exploit multipath propagation.
• Antenna numbers at the BS can significantly impact the security to avoid attacks such
as jamming.
BLOCK DIAGRAM
architecture
architecture
architecture
• Access and mobility management function (AMF): to manage access control &
mobility.
• Session management function (SMF):setup and manages sessions.
• A
• Unified data management (UMF):manages subscriber data and profiles.
• Policy control function (PCF): provides roaming ,mobility management and QoS.
Security domains
• Network access security(A):provide user interface to access the next generation core
securely & protect against various attacks.
• Network domain security(B):protect against attacks in the wire line networks &
functions to exchange signalling data and user data in secure manner.
• User domain security(C):provide mutual authentication between the user interface &
next generation core.
• Application domain security(D):ensures the security msg exchange between user
interface and service provider as well as between user and network operator.
conclusion
conclusion
• advanced performance to enable many new applications.