Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/1058
Title: Analysis of security vulnerabilities in 5G standalone network
Authors: Mekala, Priyanka
Goel, Supriya
Haque, Meemoh
Keywords: 5G protocol
ubiquitous connectivity
Computer networking
Software Defined Networks
Network Functions Virtualization
Issue Date: 2021
Citation: Haque, Meemoh (2021). Analysis of security vulnerabilities in 5G standalone network. Dhirubhai Ambani Institute of Information and Communication Technology. x, 46 p. (Acc.No: T00998)
Abstract: The first release of the 5G protocol specifications,3rd Generation Partnership Project (3GPP) Release 15 was released in 2017 and the first 5G protocol security specifications was published in 2018. There are various development made in the area of 5G which aims to connect various aspects of human life, no matter Whether it is rural area or urban,5G aims to provide a higher network speed, low latency and ubiquitous connectivity. 5G illustrates the convergence of various use cases of wireless communication and computer networking , which includes the components such as Software Defined Networks (SDN),Network Functions Virtualization (NFV) and the edge cloud.Due to the convergence of both technology it leads to various security challenges in SDN/NFV when connected with the 5G network.In future 5G will play a very crucial role in our life,thus network must ensure that all its components and the services which it is providing to the users must be secure. The threat landscape in 5G is huge as with 5G a large number of devices will be connected with the network. The Manuscript discusses about various vulnerability and security threats that exists in 5G networks. A complete end to end 5G standalone test bed is used for analyzing the security threats. Device capabilities ie.core and radio capabilities and pre-authentication signalling message are not security protected in 5G. Security features as compared to legacy network has been improved like the encryption of International Mobile Subscriber Identity (IMSI) but still there are known vulner ability that existed in LTE still exist in 5G which need to be investigated before deploying 5G worldwide.
URI: http://drsr.daiict.ac.in//handle/123456789/1058
Appears in Collections:M Tech (EC) Dissertations

Files in This Item:
File Description SizeFormat 
Meemoh_Haque_201915010_Thesis_Report-Approved.pdf7.03 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.