Home / ICT Monitor

5G presents security challenge for telecom operators

Posted by Ewen Lucas | 6 March 2019 | 1,565 times

Gmail icon


Notwithstanding United States of America’s concerns that future 5G wireless networks could be vulnerable to spying by China as being highlighted by the media, businesses across the globe have long been pushing to make sure the technology is as secure as possible. This is given that uses for the lightning-fast 5G network will be virtually limitless and include autonomous cars.

With fifth-generation wireless networks, or 5G, starting to be rolled out this year, the issue of 5G security was in focus at the Mobile World Congress trade fair which got under way Monday in Barcelona.

Unlike upgrades of wireless networks in the past, 5G will deliver not just faster phone and computer data but also help connect up cars, appliances, cargo and crop equipment.

Washington has warned that allowing Chinese firms like Huawei to provide the equipment to build 5G networks could leave them vulnerable to spying on the part of China but this is only one of the risks.

5G’s much faster speeds, vast data capacity and lower latency – or response time – are expected to underpin entirely new technologies such as self-driving cars and telemedicine – which in turn may attract cyberintrusions by criminals or terrorists.

“There will be more data which will be transferred...it is clear that security is much more complicated,” said Yannick Sadowy, the director for telecoms and media at consulting firm Accenture.

Mathieu Lagrange, who is responsible for internet security at com institute, said the risks to 5G’s security “were taken into account” when the norms for the technology were established.

5G may just to be too complex to protect it from all attempts at interference

But a study by the University of Lorraine in France found that the new wireless network still contains some security holes which were already present in previous networks, 3G and 4G.

5G offers “improved data protection when compared to the previous wireless norms” but “flaws persist and the weaknesses that have been identified” could allow “several cyberattacks and have an impact on the protection of privacy,” it said.

Experts say the architecture of 5G networks also presents entirely new security challenges.

Fifth generation wireless networks use “network virtualisation”, which refers to moving some resources which have traditionally been delivered in physical hardware to a virtual software-based network.

It is designed to allow the network to make better use of data transfer rates and provide more flexibility to 5G networks.

Darren Anstee, a technology director at Netscout, a software provider for networks said “operators are moving from hardware systems to virtualised and fully automated ones. Security is about visibility, when you can’t see everything on your network, this is when you have a problem.”

He also noted that nothing can be 100% secure but 5Gs allow for the available bandwidth to be split up into channels, each of which is independent  from others and can be separately secured, which some experts say can boost security.

“We can create a kind of micro-networks, with different levels of security. The idea is to compartmentalise the network according to different uses.”

On the deeper issue of security for the networks, an analyst at Fitch Solutions said the main challenge for security is the rise in the number of entry points considering exponential number of objects which will be connected. “From the point of view of security, the network itself is secondary. You have to keep in mind that nothing will ever be 100% secure. We still don’t have a precise idea of how billions or even trillions of connected objects could affect networks,” he reiterated.

These are as Mobile Communications industry body GSMA which stages the Mobile World Congress estimates the number of connected devices will triple to 25billion by year 2025.


Source: News Express

Readers Comments

0 comment(s)

No comments yet. Be the first to post comment.


You may also like...

ICT Monitor