Вы находитесь на странице: 1из 18

Viswesvaraya Technological University, Belagavi

Seminar Presentation

5G Technology and Security


by

Ranjeet Kumar Upadhyay : 1AY15EC075

Under the guidance of

Mrs Pranita Palsapure


Assistant Professor

Department of Electronics and Communication Engineering


Acharya Institute of Technology, Soladevenahalli, Bengaluru
4G drawbacks

4G Drawbacks
• Complex hardware.
• Connectivity is still limited.
• Have it’s initial glitches and bugs.
• Much poorer battery life on this network.
• Possibility of some interference and it cable of being attacked.
• forced to buy new devices to support 4G.
evolution of 5G

evolution of 5G
• Started from late 2010s

• Better connectivity and coverage.

• It is a complete wireless communication with no limitations

• Large number of accessories could be access.

• Low consumption of battery.

• High speed & high capacity.

• Faster data transmission that of the previous generation.


attacks

attacks
Attack : Gaining the access of data by unauthorized user.
Types of attacks:

Passive attack: Data is only access by the unauthorized person but not modified the
data.
Active attack: Data can be modified by the 3rd person.

Security attack:
• Eavesdropping
• Jamming
• DoS AND DDoS
• MITM
Eavesdropping
eavesdropping Jamming

• an intentional interference attacks on


• tries to steal information that computers,
wireless network.
smartphones transmit over a network.
• an attempt of making the users not possible
• Due to the passive nature, eavesdropping is
to use network resources.
hard to detect
• jammers work by the transmission of radio
• Encryption of the signal is used to avoid this
signals that disrupt communications
attack.

Jamming
DoS & DDoS MITM

DoS & DDoS


4G Drawbacks
DoS (Denial of Service) attack: One attacker. • a form of eavesdropping where communication
• to make a web resources unavailable to it’s users between two users is monitored and modified by
by flooding the target URL with more requests an unauthorized party.
than the server can handle.
• Mutual authentication between the mobile device
DDoS (Distributed Denial of Services)attack: can be solution to this attack.
Thousands of requests.
• typically thousands of unsuspecting zombie
machines.

MITM
• machine used in such attacks are collectively
known as “Botnets”
Security services

Security services
1. authentication

2. confidentiality

3. availability

4. integrity
authentication
authentication confidentiality

4G Drawbacks
• a process that ensures and confirms a user’s • protecting information from being accessed by
identity. unauthorized parties.

• begins when a user tries to access information. • a set of rules that limits access to information.

• the user must prove his access rights and identity. • consists of two aspects, i.e., data confidentiality
and privacy.

confidentiality
• Data encryption is a common method of
ensuring confidentiality.
integrity availability

integrity
• defined as the degree to which a service is
• involves maintaining the consistency, accuracy and accessible and usable to any legitimate users
trustworthiness of data over its entire life cycle. whenever and wherever it is requested.

• Data must not be changed in transit. • it is a key performance metric in 5G.

• Integrity prevents information from being • One of the major attacks is DoS attack.
modified.

integrity
technologies

technologies
1. SDN

2. HetNet

3. D2D

4. massive MIMO
SDN(Software Defined Network)

• a type of security model in which the information security in a computing


environment is implemented, controlled and managed by security services.

SDN
• all protocols- specific features are implemented in software.

• Encryption and use of digital signature can be used to prevent attacks such as MITM.
HetNET (Heterogenous Network)

• a network connecting computers and other devices with different OS and protocols.

HetNet
• HetNet achieves higher capacity, wider coverage and better performance in EE and
SE.

• Cross-layer cooperation scheme is purposed to tackle jamming attack.

• intrusion detection techniques is introduced.


D2D (Device 2 Device)

• communication that enables direct communication between nearby devices.

D2D
• Cryptography is applied to achieve security requirements.

• Dynamic spectrum access is used to tackle jamming

• Cooperation between D2D nodes is a popular way to secure the D2D


communications against eavesdroppers.
massive MIMO (multiple input multiple output)

• method for multiplying the capacity of a radio link using multiple transmission and

massive MIMO
receiving antennas to exploit multipath propagation.

• 5G Base Stations can support about a hundred ports.

• Antenna numbers at the BS can significantly impact the security to avoid attacks such
as jamming.

• technologies such as millimetre waves is used.


architecture

BLOCK DIAGRAM

architecture
architecture

architecture
• Access and mobility management function (AMF): to manage access control &
mobility.
• Session management function (SMF):setup and manages sessions.
• A
• Unified data management (UMF):manages subscriber data and profiles.
• Policy control function (PCF): provides roaming ,mobility management and QoS.
Security domains
• Network access security(A):provide user interface to access the next generation core
securely & protect against various attacks.
• Network domain security(B):protect against attacks in the wire line networks &
functions to exchange signalling data and user data in secure manner.
• User domain security(C):provide mutual authentication between the user interface &
next generation core.
• Application domain security(D):ensures the security msg exchange between user
interface and service provider as well as between user and network operator.
conclusion

conclusion
• advanced performance to enable many new applications.

• security services provided such as authentication, availability, data confidentiality,


key management and privacy have been introduced.

• New technologies such as HetNet, D2D, massive MIMO, SDN.

Вам также может понравиться