Viswesvaraya Technological University, Belagavi Seminar Presentation 5G Technology and Security Under the guidance of Ranjeet Kumar Upadhyay : 1AY15EC075 Department of Electronics and Communication Engineering Acharya Institute of Technology, Soladevenahalli , Bengaluru Mrs Pranita Palsapure Assistant Professor by
4G Drawbacks 4G drawbacks Complex hardware. Connectivity is still limited. Have it’s initial glitches and bugs. Much poorer battery life on this network. Possibility of some interference and it cable of being attacked. forced to buy new devices to support 4G.
evolution of 5G evolution of 5G Started from late 2010s Better connectivity and coverage. It is a complete wireless communication with no limitations Large number of accessories could be access. Low consumption of battery. High speed & high capacity. Faster data transmission that of the previous generation.
attacks attacks Attack : Gaining the access of data by unauthorized user . Types of attacks: Passive attack: Data is only access by the unauthorized person but not modified the data. Active attack: Data can be modified by the 3 rd person. Security attack: Eavesdropping Jamming DoS AND DDoS MITM
Eavesdropping Jamming eavesdropping Jamming tries to steal information that computers, smartphones transmit over a network. Due to the passive nature, eavesdropping is hard to detect Encryption of the signal is used to avoid this attack. an intentional interference attacks on wireless network. an attempt of making the users not possible to use network resources. jammers work by the transmission of radio signals that disrupt communications
4G Drawbacks DoS & DDoS MITM MITM DoS & DDoS DoS (Denial of Service) attack: One attacker. to make a web resources unavailable to it’s users by flooding the target URL with more requests than the server can handle. DDoS ( Distributed Denial of Services )attack: Thousands of requests. typically thousands of unsuspecting zombie machines. machine used in such attacks are collectively known as “Botnets” a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. Mutual authentication between the mobile device can be solution to this attack.
4G Drawbacks authentication authentication confidentiality confidentiality a process that ensures and confirms a user’s identity. begins when a user tries to access information. the user must prove his access rights and identity. protecting information from being accessed by unauthorized parties. a set of rules that limits access to information. consists of two aspects, i.e., data confidentiality and privacy. Data encryption is a common method of ensuring confidentiality.
integrity integrity integrity availability defined as the degree to which a service is accessible and usable to any legitimate users whenever and wherever it is requested. it is a key performance metric in 5G. One of the major attacks is DoS attack. involves maintaining the consistency, accuracy and trustworthiness of data over its entire life cycle. Data must not be changed in transit. Integrity prevents information from being modified.
technologies technologies SDN 2. HetNet D2D 4. massive MIMO
SDN SDN(Software Defined Network) a type of security model in which the information security in a computing environment is implemented, controlled and managed by security services. all protocols- specific features are implemented in software. Encryption and use of digital signature can be used to prevent attacks such as MITM.
HetNet HetNET (Heterogenous Network) a network connecting computers and other devices with different OS and protocols. HetNet achieves higher capacity, wider coverage and better performance in EE and SE. Cross-layer cooperation scheme is purposed to tackle jamming attack. intrusion detection techniques is introduced.
D2D D2D (Device 2 Device) communication that enables direct communication between nearby devices. Cryptography is applied to achieve security requirements. Dynamic spectrum access is used to tackle jamming Cooperation between D2D nodes is a popular way to secure the D2D communications against eavesdroppers.
massive MIMO massive MIMO (multiple input multiple output) method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation. 5G Base Stations can support about a hundred ports. Antenna numbers at the BS can significantly impact the security to avoid attacks such as jamming. technologies such as millimetre waves is used.
architecture architecture BLOCK DIAGRAM
A architecture architecture Access and mobility management function (AMF): to manage access control & mobility. Session management function (SMF):setup and manages sessions. Unified data management (UMF):manages subscriber data and profiles. Policy control function (PCF): provides roaming ,mobility management and QoS. Security domains Network access security(A):provide user interface to access the next generation core securely & protect against various attacks. Network domain security(B):protect against attacks in the wire line networks & functions to exchange signalling data and user data in secure manner. User domain security(C):provide mutual authentication between the user interface & next generation core. Application domain security(D):ensures the security msg exchange between user interface and service provider as well as between user and network operator.
conclusion conclusion advanced performance to enable many new applications. security services provided such as authentication, availability, data confidentiality, key management and privacy have been introduced. New technologies such as HetNet , D2D, massive MIMO, SDN.