2
Most read
3
Most read
6
Most read
Viswesvaraya Technological University, Belagavi
Seminar Presentation
5G Technology and Security
Under the guidance of
Ranjeet Kumar Upadhyay : 1AY15EC075
Department of Electronics and Communication Engineering
Acharya Institute of Technology, Soladevenahalli, Bengaluru
Mrs Pranita Palsapure
Assistant Professor
by
4GDrawbacks
4G drawbacks
• Complex hardware.
• Connectivity is still limited.
• Have it’s initial glitches and bugs.
• Much poorer battery life on this network.
• Possibility of some interference and it cable of being
attacked.
• forced to buy new devices to support 4G.
evolutionof5G
evolution of 5G
• Started from late 2010s
• Better connectivity and coverage.
• It is a complete wireless communication with no limitations
• Large number of accessories could be access.
• Low consumption of battery.
• High speed & high capacity.
• Faster data transmission that of the previous generation.
attacks
attacks
Attack : Gaining the access of data by unauthorized user.
Types of attacks:
Passive attack: Data is only access by the unauthorized person but
not modified the data.
Active attack: Data can be modified by the 3rd person.
Security attack:
• Eavesdropping
• Jamming
• DoS AND DDoS
• MITM
EavesdroppingJamming
eavesdropping Jamming
• tries to steal information that
computers, smartphones transmit
over a network.
• Due to the passive nature,
eavesdropping is hard to detect
• Encryption of the signal is used to
avoid this attack.
• an intentional interference attacks
on wireless network.
• an attempt of making the users not
possible to use network resources.
• jammers work by the transmission
of radio signals that disrupt
communications
4GDrawbacks
DoS&DDoSMITM
MITMDoS & DDoS
DoS (Denial of Service) attack: One
attacker.
• to make a web resources unavailable to
it’s users by flooding the target URL
with more requests than the server can
handle.
DDoS (Distributed Denial of Services)attack:
Thousands of requests.
• typically thousands of unsuspecting
zombie machines.
• machine used in such attacks are
collectively known as “Botnets”
• a form of eavesdropping where
communication between two users is
monitored and modified by an
unauthorized party.
• Mutual authentication between the
mobile device can be solution to this
attack.
Security
Security services
1. authentication
2. confidentiality
3. availability
4. integrity
4GDrawbacks
authentication
authentication
confidentiality
confidentiality
• a process that ensures and confirms a
user’s identity.
• begins when a user tries to access
information.
• the user must prove his access rights
and identity.
• protecting information from being
accessed by unauthorized parties.
• a set of rules that limits access to
information.
• consists of two aspects, i.e., data
confidentiality and privacy.
• Data encryption is a common method
of ensuring confidentiality.
integrityintegrity
integrit
y
availability
• defined as the degree to which a
service is accessible and usable to any
legitimate users whenever and
wherever it is requested.
• it is a key performance metric in 5G.
• One of the major attacks is DoS
attack.
• involves maintaining the consistency,
accuracy and trustworthiness of data
over its entire life cycle.
• Data must not be changed in transit.
• Integrity prevents information from being
modified.
technologies
technologies
1. SDN
2. HetNet
3. D2D
4. massive MIMO
SDN
SDN(Software Defined
Network)
• a type of security model in which the information security in a
computing environment is implemented, controlled and managed by
security services.
• all protocols- specific features are implemented in software.
• Encryption and use of digital signature can be used to prevent
attacks such as MITM.
HetNet
HetNET (Heterogenous
Network)
• a network connecting computers and other devices with different OS
and protocols.
• HetNet achieves higher capacity, wider coverage and better
performance in EE and SE.
• Cross-layer cooperation scheme is purposed to tackle jamming
attack.
• intrusion detection techniques is introduced.
D2D
D2D (Device 2
Device)
• communication that enables direct communication between nearby
devices.
• Cryptography is applied to achieve security requirements.
• Dynamic spectrum access is used to tackle jamming
• Cooperation between D2D nodes is a popular way to secure the D2D
communications against eavesdroppers.
massiveMIMO
massive MIMO (multiple input multiple
output)
• method for multiplying the capacity of a radio link using multiple
transmission and receiving antennas to exploit multipath
propagation.
• 5G Base Stations can support about a hundred ports.
• Antenna numbers at the BS can significantly impact the security to
avoid attacks such as jamming.
• technologies such as millimetre waves is used.
architecture
architecture
BLOCK
DIAGRAM
• A
architecture
architecture
• Access and mobility management function (AMF): to manage access
control & mobility.
• Session management function (SMF):setup and manages sessions.
• Unified data management (UMF):manages subscriber data and
profiles.
• Policy control function (PCF): provides roaming ,mobility
management and QoS.
Security domains
• Network access security(A):provide user interface to access the next
generation core securely & protect against various attacks.
• Network domain security(B):protect against attacks in the wire line
networks & functions to exchange signalling data and user data in
secure manner.
• User domain security(C):provide mutual authentication between the
user interface & next generation core.
conclusion
conclusi
on
• advanced performance to enable many new applications.
• security services provided such as authentication, availability, data
confidentiality, key management and privacy have been introduced.
• New technologies such as HetNet, D2D, massive MIMO, SDN.
Presentation on 5G security

More Related Content

PDF
5G Security Briefing
PPTX
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
PDF
Online Electronic Shopping Project Report Final Year
PDF
4G to 5G Evolution
PPT
Packet tracer
PPTX
MIMO Antenna and Technology installation
PPT
Powerpoint presentation on 5G wireless technology
PPSX
6G Technology
5G Security Briefing
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
Online Electronic Shopping Project Report Final Year
4G to 5G Evolution
Packet tracer
MIMO Antenna and Technology installation
Powerpoint presentation on 5G wireless technology
6G Technology

What's hot (20)

PPTX
5G and 6G.pptx
PPSX
5g nertwork
PDF
5G Network Architecture and Design
PPTX
6G Communication
PDF
Qualcomm 5G Vision Presentation
PPTX
Wireless communication technologies
DOCX
PPTX
Wireless network
PPT
D2D - Device to Device Communication
PDF
5G Technology Tutorial
PDF
Digital Cellular Technologies
PDF
Millimeter Waves (mmWaves)
PDF
Designing 5G NR (New Radio)
PPT
Comparison between 2g, 2.5g, 3g, lte and lte a
PDF
Cloud RAN and Evolution to 5G
PPTX
Mac protocols
PPT
Fortigate Training
DOCX
Computer science seminar topics
DOCX
wireless sensor network
5G and 6G.pptx
5g nertwork
5G Network Architecture and Design
6G Communication
Qualcomm 5G Vision Presentation
Wireless communication technologies
Wireless network
D2D - Device to Device Communication
5G Technology Tutorial
Digital Cellular Technologies
Millimeter Waves (mmWaves)
Designing 5G NR (New Radio)
Comparison between 2g, 2.5g, 3g, lte and lte a
Cloud RAN and Evolution to 5G
Mac protocols
Fortigate Training
Computer science seminar topics
wireless sensor network
Ad

Similar to Presentation on 5G security (20)

PPTX
Cellular wireless network security
PPTX
dccn ppt-1.pptx
PDF
A Literature Review Of Security Threats To Wireless Networks
PPTX
Computer Networking
DOCX
1Table of Contents.docx
PPTX
SECURITY and PRINCIPLES IN 5G Technologies.pptx
PPT
Security in wireless cellular network
PPTX
A survey in privacy security in IOT
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
What are data networks?
DOCX
A survey study of title security and privacy in mobile systems
PPT
Internet of things , presentation, rajiv gandhi university
PDF
JCC_2015120915212763
PPTX
Network-security-ppt.pptx...............
PPTX
networks security networks security cs.pptx
PDF
Will Internet of Things (IoT) be secure enough?
PPTX
6 - Wireless and Cloud Computing Security (english).pptx
PDF
G011123539
PPT
Android vulnerability study
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Cellular wireless network security
dccn ppt-1.pptx
A Literature Review Of Security Threats To Wireless Networks
Computer Networking
1Table of Contents.docx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
Security in wireless cellular network
A survey in privacy security in IOT
A survey in privacy and security in Internet of Things IOT
What are data networks?
A survey study of title security and privacy in mobile systems
Internet of things , presentation, rajiv gandhi university
JCC_2015120915212763
Network-security-ppt.pptx...............
networks security networks security cs.pptx
Will Internet of Things (IoT) be secure enough?
6 - Wireless and Cloud Computing Security (english).pptx
G011123539
Android vulnerability study
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Ad

Recently uploaded (20)

PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
PDF
Examining Bias in AI Generated News Content.pdf
PDF
TicketRoot: Event Tech Solutions Deck 2025
PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PDF
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
PPTX
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
PDF
Optimizing bioinformatics applications: a novel approach with human protein d...
PDF
Decision Optimization - From Theory to Practice
PDF
substrate PowerPoint Presentation basic one
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PPT
Overviiew on Intellectual property right
PPTX
How to use fields_get method in Odoo 18
PDF
The AI Revolution in Customer Service - 2025
PDF
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Technical Debt in the AI Coding Era - By Antonio Bianco
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
Presentation - Principles of Instructional Design.pptx
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
Examining Bias in AI Generated News Content.pdf
TicketRoot: Event Tech Solutions Deck 2025
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
Optimizing bioinformatics applications: a novel approach with human protein d...
Decision Optimization - From Theory to Practice
substrate PowerPoint Presentation basic one
Build automations faster and more reliably with UiPath ScreenPlay
Overviiew on Intellectual property right
How to use fields_get method in Odoo 18
The AI Revolution in Customer Service - 2025
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf

Presentation on 5G security

  • 1. Viswesvaraya Technological University, Belagavi Seminar Presentation 5G Technology and Security Under the guidance of Ranjeet Kumar Upadhyay : 1AY15EC075 Department of Electronics and Communication Engineering Acharya Institute of Technology, Soladevenahalli, Bengaluru Mrs Pranita Palsapure Assistant Professor by
  • 2. 4GDrawbacks 4G drawbacks • Complex hardware. • Connectivity is still limited. • Have it’s initial glitches and bugs. • Much poorer battery life on this network. • Possibility of some interference and it cable of being attacked. • forced to buy new devices to support 4G.
  • 3. evolutionof5G evolution of 5G • Started from late 2010s • Better connectivity and coverage. • It is a complete wireless communication with no limitations • Large number of accessories could be access. • Low consumption of battery. • High speed & high capacity. • Faster data transmission that of the previous generation.
  • 4. attacks attacks Attack : Gaining the access of data by unauthorized user. Types of attacks: Passive attack: Data is only access by the unauthorized person but not modified the data. Active attack: Data can be modified by the 3rd person. Security attack: • Eavesdropping • Jamming • DoS AND DDoS • MITM
  • 5. EavesdroppingJamming eavesdropping Jamming • tries to steal information that computers, smartphones transmit over a network. • Due to the passive nature, eavesdropping is hard to detect • Encryption of the signal is used to avoid this attack. • an intentional interference attacks on wireless network. • an attempt of making the users not possible to use network resources. • jammers work by the transmission of radio signals that disrupt communications
  • 6. 4GDrawbacks DoS&DDoSMITM MITMDoS & DDoS DoS (Denial of Service) attack: One attacker. • to make a web resources unavailable to it’s users by flooding the target URL with more requests than the server can handle. DDoS (Distributed Denial of Services)attack: Thousands of requests. • typically thousands of unsuspecting zombie machines. • machine used in such attacks are collectively known as “Botnets” • a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. • Mutual authentication between the mobile device can be solution to this attack.
  • 7. Security Security services 1. authentication 2. confidentiality 3. availability 4. integrity
  • 8. 4GDrawbacks authentication authentication confidentiality confidentiality • a process that ensures and confirms a user’s identity. • begins when a user tries to access information. • the user must prove his access rights and identity. • protecting information from being accessed by unauthorized parties. • a set of rules that limits access to information. • consists of two aspects, i.e., data confidentiality and privacy. • Data encryption is a common method of ensuring confidentiality.
  • 9. integrityintegrity integrit y availability • defined as the degree to which a service is accessible and usable to any legitimate users whenever and wherever it is requested. • it is a key performance metric in 5G. • One of the major attacks is DoS attack. • involves maintaining the consistency, accuracy and trustworthiness of data over its entire life cycle. • Data must not be changed in transit. • Integrity prevents information from being modified.
  • 11. SDN SDN(Software Defined Network) • a type of security model in which the information security in a computing environment is implemented, controlled and managed by security services. • all protocols- specific features are implemented in software. • Encryption and use of digital signature can be used to prevent attacks such as MITM.
  • 12. HetNet HetNET (Heterogenous Network) • a network connecting computers and other devices with different OS and protocols. • HetNet achieves higher capacity, wider coverage and better performance in EE and SE. • Cross-layer cooperation scheme is purposed to tackle jamming attack. • intrusion detection techniques is introduced.
  • 13. D2D D2D (Device 2 Device) • communication that enables direct communication between nearby devices. • Cryptography is applied to achieve security requirements. • Dynamic spectrum access is used to tackle jamming • Cooperation between D2D nodes is a popular way to secure the D2D communications against eavesdroppers.
  • 14. massiveMIMO massive MIMO (multiple input multiple output) • method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation. • 5G Base Stations can support about a hundred ports. • Antenna numbers at the BS can significantly impact the security to avoid attacks such as jamming. • technologies such as millimetre waves is used.
  • 16. • A architecture architecture • Access and mobility management function (AMF): to manage access control & mobility. • Session management function (SMF):setup and manages sessions. • Unified data management (UMF):manages subscriber data and profiles. • Policy control function (PCF): provides roaming ,mobility management and QoS. Security domains • Network access security(A):provide user interface to access the next generation core securely & protect against various attacks. • Network domain security(B):protect against attacks in the wire line networks & functions to exchange signalling data and user data in secure manner. • User domain security(C):provide mutual authentication between the user interface & next generation core.
  • 17. conclusion conclusi on • advanced performance to enable many new applications. • security services provided such as authentication, availability, data confidentiality, key management and privacy have been introduced. • New technologies such as HetNet, D2D, massive MIMO, SDN.