5G Cybersecurity
5G Cybersecurity
Anitha Rosely
Specialist 2, Inside Product
Dell Technologies
Anitharosely.rosely@dell.com
Haseeb Makarabbi
Senior Sales Engineer Analyst
Dell Technologies
Haseeb.makarabbi@dell.com
Courses are offered to meet different learning styles and schedules, including self-paced On Demand,
remote-based Virtual Instructor-Led and in-person Classrooms.
Whether you are an experienced IT professional or just getting started, Dell Technologies Proven
Professional certifications are designed to clearly signal proficiency to colleagues and employers.
Disclaimer: The views, processes or methodologies published in this article are those of the authors.
They do not necessarily reflect Dell Technologies’ views, processes or methodologies.
Dell.com/certification 3
Introduction
As common to all new technology, there will always be a vulnerability that will come with it. With 5G (the
5th generation of wireless data networks), people usually think about higher data speeds, but it's not the
only advantage or use case 5G offers. Due to its low latency, low power consumption, a nd high data
capacity, 5G opens several possibilities for Internet of Things (IoT) devices to be connected on a scale
never seen before. It opens more use cases for smart homes, smart campuses, or even smart cities.
Most 5G networks will be managed by software, mostly using Artificial Intelligence (AI) and Machine
Learning (ML) models. Software is needed because 5G is designed to handle enormous amounts and
varying types of data and it will be needed for auto-scaling and properly handling the load too. Threat
actors will try to take over that software to control it and manipulate the network and they can also try
to target the ML and AI models by poisoning the data. Doing so would enable them to create blind spots
so that they can bypass the security or fly under the radar.
High-band 5G frequencies can hold the biggest bandwidth, but it also comes with the cost of coverage.
This means that the data can only travel a significantly shorter distance compared to its predecessors.
Network providers are trying to address this by installing smaller cells in different spots in an area, such
as lamp posts, opening a lot of attack surfaces for threat actors. For example, if they compromise one of
these small cells, they can perform man-in-the-middle attacks to listen in on the network traffic and
manipulate the data. This will add another problem; with more points to secure, it could only take one of
these small cells to become compromised to affect the entire network. 5G is a new technology, and as is
common with all new technologies, there will always be new vulnerabilities that will be discovered along
with it. The best way to handle all the new vulnerabilities is to be aware of the attack scenarios and
mitigations, which will be covered in this article in detail.
5G will do much more than significantly improve your network connection. It opens new opportunities,
enabling us to deliver ground-breaking solutions that benefit the entire society.
To protect vital personal identifiable information carried on telco networks – phone number, cell ID, etc.
– all the keys as well as subscriber data that will be stored in the User Data Repository must be secured.
The telco network is robust and has many components. Thus, we need to make take steps to limit or
eliminate network downtime. The best approach is to target maintaining confidentiality; for example,
when a message is sent from point A to Point B, no third party should be able to see the message/data.
There should be data integrity that the message sent from Point A to point B should be the exact copy
that point B is receiving, ensuring no data tampering between these points.
Equally important is data availability. There should always be a redundant node in the network to make
sure data is not lost. Suppose there's an unexpected traffic increase; the availability of your network
should not be compromised. Another consideration is traceability which means for example if anybody is
accessing some nodes or escalation of privileges occurs. You should have the ability to trace it back in
terms of who has done it and what command has been executed so you can reverse engineer the instance
and analyze what's going on inside your network.
Dell.com/certification 5
Data assets is basically the user communication data, how the user is communicating with the network.
It also has privacy information, such as subscription and location information. etc. as well as some critical
reports such as measurement reports, CDRS, and key data for system operation. It also holds all the logs
management data which is needed to support confidentiality and integrity of the data assets
Hardware assets hold all the data center equipment. Some are listed below:
• RAN BBU/RRU Hardware
• Cabinet
• COTS Server
• Firewall & Security gateway hardware
• Router and switch hardware
Software assets tell us what software layer is used in your network function virtualization (NFV) stack
and all the software that is used in the 5G network. Some are listed below:
• RAN, core network and EMS Software
• Operating system software
• Docker software
• DB Software
• Open-Source and third-party software
We also have intra-domain threats which are internally to the domain, for example between RAN and
Core network, OSS and the multi-access edge computing (MEC) domain or all the things that are
happening inside this network.
Dell.com/certification 7
5) Lawful Interception Security Threats
• Illegal interception gateway access
• Leakage of intercepted target ID
• Interception data leakage due to attacks from interception port
1. Locally stored confidential information is stolen or tampered with, such as keys and user context
information.
2. User privacy information is stolen or tampered with, including subscription data and CDRs.
3. Unauthorized access to user-Plane data from other Planes.
Dell.com/certification 9
Intra-domain: O&M Security Threat Analysis
In Figure 6, client is connected to EMS. The EMS is in turn connected to both gNodeB and 5GC.
This is an environment where there is possibility of O&M security threats.
From the client side, some threats may arise due to Unauthorized access, Password cracking/Leakage and
Malicious operations by authorized users while the gNodeB can face issues when there is a Malware
implantation.
The EMS could face a user privacy leakage and on occasion, log deletion/Tampering could also happen.
Threats for the 5GC happens when the sensitive O&M data is tampered or leaked to the attackers.
None of these threats suggests that we should halt our progress toward 5G's benefits. It does, however,
suggest that our current 5G strategy should be reconsidered.
➢ The market for DevSecOps is increasing: Most software developers today must incorporate
DevSecOps into their development processes to create safe solutions. Rather than putting
security into an already created product, this is the approach of building security into every phase
of the production lifecycle. It requires including cybersecurity as a design element in the
development phase, as well as deploying all new projects. Because 5G is based on software, it's
➢ Using AI and machine learning in security: The crucial role of AI and ML in the development of
5G is an established reality. Driverless vehicles, for example, rely on 5G networks for real-time
communication, but they also need AI and ML capabilities. They navigate a smart city using a
combination of AI, sensors, radars, and cameras, rather than human operators. From a security
standpoint, the majority of 5G network threats target software that controls critical processes.
They require countermeasures that are software-based and sophisticated. People should not be
used as defenses against machine-based attacks. The benefit of employing AI-powered security
solutions is that they effectively self-learn and update to fit in any scenario.
➢ Emerging best practices: As new technologies develop, best security practices must evolve.
Because 5G technologies have whole new infrastructures and dangers, most earlier network
security standards are inapplicable. The best security measures, according to the National
Institute of Standards and Technology (NIST) () Cybersecurity Framework, are to identify, protect,
detect, respond, and recover. These may be appropriate for protecting enterprises from external
and internal threats, but they are ineffective for developing 5G IoT systems and devices. While
industry-specific best practices can be useful, they can only be as strong as their weakest link.
They impose the greatest burden on users who are ill-informed and may not realize if they are
following best practices.
Conclusion
To address the difficulties of huge connectivity, flexibility, and cost, 5G will leverage mobile clouds, SDN,
and NFV. With all their advantages, these technologies also come with security risks. As a result, in this
article, we've highlighted the primary security concerns that, if not addressed effectively, could become
more dangerous in 5G. The security threat vectors cannot be completely realized at this moment due to
limited standalone and integrated deployment of these technologies in 5G. Similarly, as more user devices,
such as IoT, are connected and more diversified sets of services are offered in 5G, communication security
and privacy problems will become more visible.
Dell.com/certification 11
It is likely that when new 5G technology and services are deployed, new forms of security threats and
issues will emerge. However, addressing these issues from the beginning of the design process through
deployment will reduce the risk of security and privacy breaches.
References
• https://learn.g2.com/advantages-of-5g-technology
• https://www.facebook.com/CyberVisionptyltd/videos/is-5g-a-cyber-security-threatnew-technology-always-
brings-new-challenges-will-5g/2869151699968394/
• https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2020/07/24/tk -bijlage-5g-
toolbox-implementation-report/tk-bijlage-5g-toolbox-implementation-report.pdf
• https://www.forbes.com/sites/arthurherman/2019/03/26/how-america-can-still-win-the-battle-for-5g/
• https://cybersguards.com/5g-cybersecurity/
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” DELL TECHNOLOGIES MAKES NO
RESPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Use, copying and distribution of any Dell Technologies software described in this publication requires an
applicable software license.
Copyright © 2022 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC
and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be
trademarks of their respective owners.
Dell.com/certification 13