SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
Viswesvaraya Technological University, Belagavi
Seminar Presentation
5G Technology and Security
Under the guidance of
Ranjeet Kumar Upadhyay : 1AY15EC075
Department of Electronics and Communication Engineering
Acharya Institute of Technology, Soladevenahalli, Bengaluru
Mrs Pranita Palsapure
Assistant Professor
by
4GDrawbacks
4G drawbacks
• Complex hardware.
• Connectivity is still limited.
• Have it’s initial glitches and bugs.
• Much poorer battery life on this network.
• Possibility of some interference and it cable of being
attacked.
• forced to buy new devices to support 4G.
evolutionof5G
evolution of 5G
• Started from late 2010s
• Better connectivity and coverage.
• It is a complete wireless communication with no limitations
• Large number of accessories could be access.
• Low consumption of battery.
• High speed & high capacity.
• Faster data transmission that of the previous generation.
attacks
attacks
Attack : Gaining the access of data by unauthorized user.
Types of attacks:
Passive attack: Data is only access by the unauthorized person but
not modified the data.
Active attack: Data can be modified by the 3rd person.
Security attack:
• Eavesdropping
• Jamming
• DoS AND DDoS
• MITM
EavesdroppingJamming
eavesdropping Jamming
• tries to steal information that
computers, smartphones transmit
over a network.
• Due to the passive nature,
eavesdropping is hard to detect
• Encryption of the signal is used to
avoid this attack.
• an intentional interference attacks
on wireless network.
• an attempt of making the users not
possible to use network resources.
• jammers work by the transmission
of radio signals that disrupt
communications
4GDrawbacks
DoS&DDoSMITM
MITMDoS & DDoS
DoS (Denial of Service) attack: One
attacker.
• to make a web resources unavailable to
it’s users by flooding the target URL
with more requests than the server can
handle.
DDoS (Distributed Denial of Services)attack:
Thousands of requests.
• typically thousands of unsuspecting
zombie machines.
• machine used in such attacks are
collectively known as “Botnets”
• a form of eavesdropping where
communication between two users is
monitored and modified by an
unauthorized party.
• Mutual authentication between the
mobile device can be solution to this
attack.
Security
Security services
1. authentication
2. confidentiality
3. availability
4. integrity
4GDrawbacks
authentication
authentication
confidentiality
confidentiality
• a process that ensures and confirms a
user’s identity.
• begins when a user tries to access
information.
• the user must prove his access rights
and identity.
• protecting information from being
accessed by unauthorized parties.
• a set of rules that limits access to
information.
• consists of two aspects, i.e., data
confidentiality and privacy.
• Data encryption is a common method
of ensuring confidentiality.
integrityintegrity
integrit
y
availability
• defined as the degree to which a
service is accessible and usable to any
legitimate users whenever and
wherever it is requested.
• it is a key performance metric in 5G.
• One of the major attacks is DoS
attack.
• involves maintaining the consistency,
accuracy and trustworthiness of data
over its entire life cycle.
• Data must not be changed in transit.
• Integrity prevents information from being
modified.
technologies
technologies
1. SDN
2. HetNet
3. D2D
4. massive MIMO
SDN
SDN(Software Defined
Network)
• a type of security model in which the information security in a
computing environment is implemented, controlled and managed by
security services.
• all protocols- specific features are implemented in software.
• Encryption and use of digital signature can be used to prevent
attacks such as MITM.
HetNet
HetNET (Heterogenous
Network)
• a network connecting computers and other devices with different OS
and protocols.
• HetNet achieves higher capacity, wider coverage and better
performance in EE and SE.
• Cross-layer cooperation scheme is purposed to tackle jamming
attack.
• intrusion detection techniques is introduced.
D2D
D2D (Device 2
Device)
• communication that enables direct communication between nearby
devices.
• Cryptography is applied to achieve security requirements.
• Dynamic spectrum access is used to tackle jamming
• Cooperation between D2D nodes is a popular way to secure the D2D
communications against eavesdroppers.
massiveMIMO
massive MIMO (multiple input multiple
output)
• method for multiplying the capacity of a radio link using multiple
transmission and receiving antennas to exploit multipath
propagation.
• 5G Base Stations can support about a hundred ports.
• Antenna numbers at the BS can significantly impact the security to
avoid attacks such as jamming.
• technologies such as millimetre waves is used.
architecture
architecture
BLOCK
DIAGRAM
• A
architecture
architecture
• Access and mobility management function (AMF): to manage access
control & mobility.
• Session management function (SMF):setup and manages sessions.
• Unified data management (UMF):manages subscriber data and
profiles.
• Policy control function (PCF): provides roaming ,mobility
management and QoS.
Security domains
• Network access security(A):provide user interface to access the next
generation core securely & protect against various attacks.
• Network domain security(B):protect against attacks in the wire line
networks & functions to exchange signalling data and user data in
secure manner.
• User domain security(C):provide mutual authentication between the
user interface & next generation core.
conclusion
conclusi
on
• advanced performance to enable many new applications.
• security services provided such as authentication, availability, data
confidentiality, key management and privacy have been introduced.
• New technologies such as HetNet, D2D, massive MIMO, SDN.
Presentation on 5G security

More Related Content

PDF
5G Security Briefing
PDF
4G to 5G Evolution
PDF
5G network architecture progress
PDF
Online Electronic Shopping Project Report Final Year
PPT
Powerpoint presentation on 5G wireless technology
PPT
5G Presentation
PPT
Robots presentation
PDF
SDN Security: Two Sides of the Same Coin
5G Security Briefing
4G to 5G Evolution
5G network architecture progress
Online Electronic Shopping Project Report Final Year
Powerpoint presentation on 5G wireless technology
5G Presentation
Robots presentation
SDN Security: Two Sides of the Same Coin

What's hot (20)

PPT
IoT security (Internet of Things)
PDF
Overview of IoT and Security issues
PPTX
IoT Security
PPT
Network security cryptography ppt
PPTX
Ip spoofing ppt
PPTX
Iot security and Authentication solution
PPTX
Intrusion detection system
PPT
Network security
PDF
Telecom Security in the Era of 5G and IoT
PDF
Fog Computing
PPTX
IP Security
PPTX
Security in IoT
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPT
Security Requirements in IoT Architecture
PPTX
6G Communication
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
The Differences Between Bluetooth, ZigBee and WiFi
PDF
Security challenges in IoT
PPTX
Iot Security
IoT security (Internet of Things)
Overview of IoT and Security issues
IoT Security
Network security cryptography ppt
Ip spoofing ppt
Iot security and Authentication solution
Intrusion detection system
Network security
Telecom Security in the Era of 5G and IoT
Fog Computing
IP Security
Security in IoT
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Security Requirements in IoT Architecture
6G Communication
IoT Security, Threats and Challenges By V.P.Prabhakaran
The Differences Between Bluetooth, ZigBee and WiFi
Security challenges in IoT
Iot Security
Ad

Similar to Presentation on 5G security (20)

PPTX
Cellular wireless network security
PPTX
dccn ppt-1.pptx
PDF
A Literature Review Of Security Threats To Wireless Networks
PPTX
Computer Networking
DOCX
1Table of Contents.docx
PPTX
SECURITY and PRINCIPLES IN 5G Technologies.pptx
PPT
Security in wireless cellular network
PPTX
A survey in privacy security in IOT
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
What are data networks?
DOCX
A survey study of title security and privacy in mobile systems
PPT
Internet of things , presentation, rajiv gandhi university
PDF
JCC_2015120915212763
PPTX
Network-security-ppt.pptx...............
PPTX
networks security networks security cs.pptx
PDF
Will Internet of Things (IoT) be secure enough?
PPTX
6 - Wireless and Cloud Computing Security (english).pptx
PDF
G011123539
PPT
Android vulnerability study
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Cellular wireless network security
dccn ppt-1.pptx
A Literature Review Of Security Threats To Wireless Networks
Computer Networking
1Table of Contents.docx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
Security in wireless cellular network
A survey in privacy security in IOT
A survey in privacy and security in Internet of Things IOT
What are data networks?
A survey study of title security and privacy in mobile systems
Internet of things , presentation, rajiv gandhi university
JCC_2015120915212763
Network-security-ppt.pptx...............
networks security networks security cs.pptx
Will Internet of Things (IoT) be secure enough?
6 - Wireless and Cloud Computing Security (english).pptx
G011123539
Android vulnerability study
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A comparative analysis of optical character recognition models for extracting...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Presentation on 5G security

  • 1. Viswesvaraya Technological University, Belagavi Seminar Presentation 5G Technology and Security Under the guidance of Ranjeet Kumar Upadhyay : 1AY15EC075 Department of Electronics and Communication Engineering Acharya Institute of Technology, Soladevenahalli, Bengaluru Mrs Pranita Palsapure Assistant Professor by
  • 2. 4GDrawbacks 4G drawbacks • Complex hardware. • Connectivity is still limited. • Have it’s initial glitches and bugs. • Much poorer battery life on this network. • Possibility of some interference and it cable of being attacked. • forced to buy new devices to support 4G.
  • 3. evolutionof5G evolution of 5G • Started from late 2010s • Better connectivity and coverage. • It is a complete wireless communication with no limitations • Large number of accessories could be access. • Low consumption of battery. • High speed & high capacity. • Faster data transmission that of the previous generation.
  • 4. attacks attacks Attack : Gaining the access of data by unauthorized user. Types of attacks: Passive attack: Data is only access by the unauthorized person but not modified the data. Active attack: Data can be modified by the 3rd person. Security attack: • Eavesdropping • Jamming • DoS AND DDoS • MITM
  • 5. EavesdroppingJamming eavesdropping Jamming • tries to steal information that computers, smartphones transmit over a network. • Due to the passive nature, eavesdropping is hard to detect • Encryption of the signal is used to avoid this attack. • an intentional interference attacks on wireless network. • an attempt of making the users not possible to use network resources. • jammers work by the transmission of radio signals that disrupt communications
  • 6. 4GDrawbacks DoS&DDoSMITM MITMDoS & DDoS DoS (Denial of Service) attack: One attacker. • to make a web resources unavailable to it’s users by flooding the target URL with more requests than the server can handle. DDoS (Distributed Denial of Services)attack: Thousands of requests. • typically thousands of unsuspecting zombie machines. • machine used in such attacks are collectively known as “Botnets” • a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. • Mutual authentication between the mobile device can be solution to this attack.
  • 7. Security Security services 1. authentication 2. confidentiality 3. availability 4. integrity
  • 8. 4GDrawbacks authentication authentication confidentiality confidentiality • a process that ensures and confirms a user’s identity. • begins when a user tries to access information. • the user must prove his access rights and identity. • protecting information from being accessed by unauthorized parties. • a set of rules that limits access to information. • consists of two aspects, i.e., data confidentiality and privacy. • Data encryption is a common method of ensuring confidentiality.
  • 9. integrityintegrity integrit y availability • defined as the degree to which a service is accessible and usable to any legitimate users whenever and wherever it is requested. • it is a key performance metric in 5G. • One of the major attacks is DoS attack. • involves maintaining the consistency, accuracy and trustworthiness of data over its entire life cycle. • Data must not be changed in transit. • Integrity prevents information from being modified.
  • 11. SDN SDN(Software Defined Network) • a type of security model in which the information security in a computing environment is implemented, controlled and managed by security services. • all protocols- specific features are implemented in software. • Encryption and use of digital signature can be used to prevent attacks such as MITM.
  • 12. HetNet HetNET (Heterogenous Network) • a network connecting computers and other devices with different OS and protocols. • HetNet achieves higher capacity, wider coverage and better performance in EE and SE. • Cross-layer cooperation scheme is purposed to tackle jamming attack. • intrusion detection techniques is introduced.
  • 13. D2D D2D (Device 2 Device) • communication that enables direct communication between nearby devices. • Cryptography is applied to achieve security requirements. • Dynamic spectrum access is used to tackle jamming • Cooperation between D2D nodes is a popular way to secure the D2D communications against eavesdroppers.
  • 14. massiveMIMO massive MIMO (multiple input multiple output) • method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation. • 5G Base Stations can support about a hundred ports. • Antenna numbers at the BS can significantly impact the security to avoid attacks such as jamming. • technologies such as millimetre waves is used.
  • 16. • A architecture architecture • Access and mobility management function (AMF): to manage access control & mobility. • Session management function (SMF):setup and manages sessions. • Unified data management (UMF):manages subscriber data and profiles. • Policy control function (PCF): provides roaming ,mobility management and QoS. Security domains • Network access security(A):provide user interface to access the next generation core securely & protect against various attacks. • Network domain security(B):protect against attacks in the wire line networks & functions to exchange signalling data and user data in secure manner. • User domain security(C):provide mutual authentication between the user interface & next generation core.
  • 17. conclusion conclusi on • advanced performance to enable many new applications. • security services provided such as authentication, availability, data confidentiality, key management and privacy have been introduced. • New technologies such as HetNet, D2D, massive MIMO, SDN.