Securing High Speed Network : Challenges and Solutions in the era of 5g

 Please Click the link to watch video:

https://mediaspace.minnstate.edu/media/Securing-High-Speed-Network(challenges%20and%20solutions%20in%20era%20of%205G)/1_n6b5785v


Abstract:

High-speed network refers to network communication infrastructure that can transmit data at higher speed than the traditional network. These networks are evolving because of growing demand for bandwidth, applications, and services. There are different technologies which are built to support the high-speed network including fiber optics, advanced modulation techniques, and efficient networking protocols.  Referring to our topic, the 5G network is one of recent example of high-speed network. 5G network is a huge jump in the field of telecommunication network because of its speed in sending and receiving data. Since this is the most powerful telecommunication network in the present context. 5G has already shown its power of speed to the world. As we know the rule, when there is more of a something there are some challenges that come with it. Since this network is powerful, the most important part is to make sure that the network is in safe hands. Otherwise, there is a chance of this network getting misused by different cyber criminals leading to vicious cybercrimes. Therefore, this report is a guideline that will closely analyze the challenges and suggest the practical solutions for getting this 5G high-speed network secured.

 


Introduction:

In the present context technology has shown its advancement at the speed of a rocket. Looking back in the past few decades the rate of technological revolution is getting faster and faster with the time. Similarly, advancement in network technology has rapidly increased in terms of their speed. Especially in telecommunication networks there has been a huge leap in the past 2 decades. It was no time we were using telephone network, 2G, 3G,4G and now the world is in the form of 5G. We can’t deny the fact that soon there will be a more powerful telecommunication high-speed network than 5G. This change has been seen due to more demand for a high-speed network. “The significant growth in wireless broadband has had a major impact on the development of 5G networks. Due to increasing high traffic volume researchers are on the verge of making more advanced network infrastructure to control that traffic” (Al-Falahy & Alani, 2017).

The invention and implementation of 5G has had played a significant role in reducing the average service creation time in wireless networks. It has enabled advanced user-controlled privacy. The goal of 5G has always been to facilitate a digital society and growing demands of devices requiring high speed network. The requirements of this digital society include high service availability and security using multiple and different sets of technologies.

 


Security Challenges & Solution in 5G Network:

Software Defined Networking (SDN) – Challenges:
As there are trillions of devices which are connected to network worldwide. With these growing devices and technologies management of networks is difficult. Especially the devices that are operates in clouds are growing in numbers. To manage these devices network flow SDN plays an important role. As SDN is designed to make network more flexible and agile it helps to manage network control and forwarding planes enabling network control to become directly programmable, and the underlying infrastructure to be abstracted for applications and network services (Hussain, 2020). Even though SDN makes network management easier by enabling programmability and logically centralizing the network control panes, these features can be a security threat for the future
(Ahmad et al., 2018). Generally, SDN has a controller which job is to control the network where the data is forwarded. It has authority to either update or modify the flow rules. This traffic control feature of SDN is visible to everyone which creates a security threat. There are different types of attack that the cyber attacker can operate if the network traffic is visible. One of the attacks that can be operated is DoS attack. Additionally, allowing programmability in SDN opens the door to potential harm if malicious applications gain access or critical interfaces are exposed.

Talking about the current scenario of SDN in 5G.  The Data elements are vulnerable to saturation attacks because the existing SDN configuration keeps traffic requests in storage until the controller modifies the forwarding rules. In order to guard against security risks, dependence on the controller also necessitates a secure control-data link. The idea of having multiple controllers can be thought as an option of having Multiple controllers may increase availability, but they may also cause conflicts and configuration problems that compromise network security as a whole. To put it another way, even while SDN has numerous advantages, security must be carefully considered in order to avoid possible disruptions and unwanted access.

Software Defined Networking (SDN) – Solution:

Although there are security challenges involved in the current scenario of SDN. SDN has the potential to be a useful tool for improving communication network security once the underlying security difficulties are resolved. Talking about the power of SDN we know that SDN enables centralized control, programmability, and a global network perspective that facilitate rapid threat identification and uniform network-wide security measures. This will help the network to react to those threats as soon as possible. SDN also brings the Proactive and reactive security methods, such as traffic analysis, monitoring, and fast reaction systems for network forensics, policy modifications, and security service integration, are all supported by the architecture.

Moreover, SDN has one of the unique features to offer transparency reading the data packet origin. It helps to show the us the route that the data packet has come through This capability allows the dynamic routing of traffic to intrusion detection systems or firewalls at runtime, enhancing security. This approach, where security functionalities are implemented in the application plane using software, is often referred to as software-defined security (Ahmad et al., 2018).

 

 

Privacy (Challenges):

As the growing use of smart devices and increasing connectivity. The data shared in the network is in higher amount. The power of 5G network possess such a capability that it can collect the data shared in a network extensively. They raise a question on the safety and privacy of the data. The collection and analysis of large volumes of data can eventually lead to detailed profiling of individuals, which may compromise their privacy. Talking from a user’s perspective when a user uses smartphone application there are different features that sends data to the network. Taking an example like personal data, location tracking and identity exposures are the user’s concern. In the current scenario 5G network requires more bandwidth to fulfil the growing demand to maintain the speed of the network. To meet this requirement more antennas and base stations are required in order to maintain and operate the 5G network efficiently. Referring to the location tracking when there are more antennas, it makes the attacker’s job easier to look for the antenna or the base station that the user’s device is connected to. This will eventually lead a cybercriminal to find out their victim’s location easily which will cause negative impact to the user. Unlike previous generations, 5G operators lose direct control as they rely on external actors, impacting governance over security and privacy. Shared environments, cloud-based data storage, and the use of Network Functions Virtualization (NFV) features create challenges in maintaining user and data privacy. Additionally, storing user data in different countries raises concerns due to varying level (Catherine Udell, 2023).


Privacy (Solutions):

To handle the privacy issue created within the 5G network there are different approaches we can take. One of the main approaches would be the 5G architecture should follow Privacy-by-design approach and service-oriented privacy-preserving strategies. The most important thing is that the power of data handling should be provided to users. So that they can take control of the data they are sending. They should be the core factor to decide what, where and to whom the data is to share with. This process can be done if the mobile operators adopt a hybrid cloud-based approach where the sensitive data are stored in the cloud. Moreover, there should be a relation-based understanding between different parties involved throughout the network process. To elaborate, establishing mutual agreements and trust models among stakeholders, including users, network operators, service providers, application developers, and manufacturers, is crucial for defining clear guidelines on data usage and storage.

Anonymity-based strategies and systems that allow users to conceal their true identities, possibly using a pseudonym, are necessary for location-based privacy. Additionally, before sending a message to a location-based service provider, it should be encrypted. Location privacy can also be preserved by obfuscation techniques, which lower the accuracy of location data. Timing attacks have been successfully defended against by location cloaking algorithms. 

Moreover, for the issues about getting location of user there needs to be an Anonymity-based strategies and systems that allow users to hide their true identities, possibly using a false name, doing so will hide the identity of the user and the attacker trying to get to the user will have the false information which will reduce the chance of that user getting victimized from cyber-attack. These things are necessary for location-based privacy. Additionally, before sending a message to a location-based provider of services, encrypted so that the attacker will not have access to see that message and gain insight of personal information (2023 Nokia).

Conclusion:
Therefore, in conclusion with this emerging technology of 5G there are different pros and cons. As 5G has been a powerful high-speed network to fulfill the demands of users and the trillions of devices, it brings some security challenges that we need to be prepared for. Therefore, to get rid of these challenges a propound solution should be implemented so that users will be safe from different types of cyber-attacks.


References

Al-Falahy, N., & Alani, O. Y. (2017). Technologies for 5G networks: Challenges and opportunities. IT Professional, 19(1), 12–20. https://doi.org/10.1109/mitp.2017.9

Hussain, A. (2020, January 20). 5G SDN and NFV. Medium. https://medium.com/@alifyahussain/5g-sdn-and-nfv-e411dbe927b1#:~:text=5G%20AND%20SDN,between%20network%20devices%20and%20applications.

Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43. https://doi.org/10.1109/mcomstd.2018.1700063

Catherine Udell (2023, July 31). 5G Security Concerns & Privacy Risks. MRL Recruitment. https://www.mrlcg.com/resources/blog/5g-security-concerns---privacy-risks/

Privacy challenges and Security Solutions for 5G networks. Nokia. (n.d.). https://www.nokia.com/thought-leadership/articles/privacy-challenges-security-solutions-5g-networks/#:~:text=Privacy%20solutions%20for%205G&text=Location%2Dbased%20privacy%20requires%20anonymity,a%20location%2Dbased%20service%20provider.

 

 

    

 

 

 


Comments

Popular posts from this blog