Research on security threats posed by legacy RATs (Radio access technologies) in 5G networks

  • Author(s) / Creator(s)
  • Due to its impact expected on the economy and society, the fifth generation of mobile telecommunications (5G) is one of the most important innovations of our time. From a conceptual perspective, 5G technology promises to deliver low latency, high speed, and more reliable connections to new generations of autonomous systems and edge-type devices, covering massive and critical machine-type communications. 5G has initiated its full development to satisfy an increasing demand for mobile data traffic and big data bandwidth. Centralized data processing, collaborative radio, real-time cloud infrastructure, and cloud radio access network (C-RAN), along with their excellent advantages, are being sought by more and more operators to meet end-user requirements.
    This research paper aims to study the concept of security threats on RAT technology in 5G networks. Its historical background and architecture through the history have evolved. The evolution of networks from 1G to 5G is also discussed as an analysis zed how faster data is required for faster networks.
    Proposed 5G architectures are designed to close security gaps from previous iterations of cellular networks, but the pervasive nature of 5G introduces new security challenges outside the traditional space. In addition, 5G’s attractive, transformative services will likely introduce threat vectors not yet seen or experienced. This paper will examine how 5G differs from other wireless architectures and what possible threats, vulnerabilities, and attacks are. Security considerations will discuss various software, virtualization, automation, orchestration, and Radio Access Network (RAN) considerations. Finally, zero-Trust security and several other techniques will be addressed to mitigate the threats, and various recommendations will be proposed for protection.
    As an excellent mobile wireless network architecture, compared with traditional RAN, C-RAN has incomparable advantages in terms of low power consumption, reduced base station (BS) numbers, and economic capital and operating expenditure. It can also improve network capacity and BS utilization rate. However, C-RAN technology in 5G mobile communication networks must deal with several security challenges relating to virtual network functions and software-defined networking. This research project aims to study and present a comprehensive evaluation of existing security studies in the field of C-RAN and corresponding security threats and attacks. Furthermore, we indicate open solutions to research issues and propose future research trends.

  • Date created
    2023-04-01
  • Subjects / Keywords
  • Type of Item
    Report
  • DOI
    https://doi.org/10.7939/r3-s1y1-xk11
  • License
    Attribution-NonCommercial 4.0 International