The 5G Technologies and Cybersecurity
CYBER NEWS

The 5G Technologies and Cybersecurity

1 Star2 Stars3 Stars4 Stars5 Stars (Ingen stemmer endnu)
Loading ...


History has witnessed that whenever we rush in to expand the computing and power or interconnect these two, we expose ourselves to the new levels of cybersecurity risks. There are only two words that differentiate this generation from the upcoming ones: speed and latency.




The 5G is estimated to be 100% times faster than the current iteration and can efficiently reduce the delays in execution for an online task. The 5G technology has been the talk-of-the-talk for the entire world as it was suspected to change the entire spectrum of the internet.

Billions of dollars have been poured in the development of this technology. Men, effective implementation requires a composite approach for a quality network infrastructure.

The 5G technology will start a new era of low latency for the internet of things; these also include remote robotics and autonomous and hypersonic weapons.

Hidtil, the governments and the mobile carriers have focused on how to implement the pre-emptive security to their fastest services efficiently. Men, looking back at the first IoT technology the history might repeat itself, and we might expose ourselves to a whole new landscape of hackers and attackers to abuse and leverage us. Although it sounds scary, den prevention of cyber threats highly depends on carefully curated, timely actions.

Although the 5G is the new player in the market, it is also an enticing domain for threat actors.

5G Exposed! Discoveries Show New Vulnerabilities

A report highlighted that there is a flaw in 5G technology as per which the surveillance entities to exploit the international mobile subscriber identity catcher to eavesdrop devices. These vulnerabilities affect the authentication and key agreement protocol which was once used to generate passwords. This protocol uses symmetric cryptography in its mechanism to generate the one-time password.

Relaterede: Svær svaghed påvirker 3G, 4G og den kommende 5G-protokollen

The vulnerability will reveal the details of the mobile user which includes:

  • The number of messages sent and received
  • Number of calls made

Tilbage i 2018, Director of the Canadian Security Intelligence Services (CSIS) David Vignault expressed his concerns over the 5G technology and said that it can target large corporations and lead to information theft. This technology can also be used to target both civilian and military personnel.

Global Politics and the Race to 5G

The current political crisis has put economies of countries worldwide at stake. It is of no surprise that superpowers have their rivalries to infect the development of 5G technology. Since states are poisoned to confront each other in the tech realm, long-standing geopolitical conflicts are predicted.

Chinese tech Huawei was the recent epicenter of this global conflict. The global leader of the telecommunications infrastructure market despite facing bans in Australia, New Zealand, and America has settled over 40 kontrakter to deliver the 5G technology across the globe.

The war between China and the USA over launching the opportunity first makes it the hot news and has seen a ban on Huawei in USA, Canada, og New Zealand. Huawei has lost 33% of its share in the market since the USA decided to discontinue Android services for the phone, along with no YouTube and Google.

China has cleared its stance that it will dominate the 5G technology from the start of the deployment of infrastructure. It appears that Beijing is determined to control the developing of 5G technology and wants to leverage the 5G system for its own benefit.

Potential Risks in the 5G Protocol

The fundamentals of 5G technology are vulnerable to potential risks, just like its forerunners. Accessibility, datasikkerhed, and confidentiality are a concern with this budding technology. The 3G and 4G technologies have brought vulnerabilities, and just like the previous generations, the 5G technology is set to be challenged by the same hurdles.

A very concerning flaw was revealed during the 2017 Black Hat conference in Las Vegas, which could allow affordable phone surveillance and location tracking. The 3G and 4G devices deployed worldwide were found vulnerable to IMSI catchers aka Stingray devices. Med andre ord, a serious cryptographic vulnerability was discovered the protocol used in 3G and 4G LTE networks enabling devices to connect with the operator.

Relaterede: Kryptografiske Fejl i 3G og 4G netværk: Alle enheder Exposed

On top of these inherited risks, like accessibility to data and malware threats, online security will become scarcer than ever and magnitude of online security barricades should be upgraded to counter potential future threats.

The new technology (5G) will revolutionize the entire IoT framework. It will be the soul to new technologies and will be the center-of-attention for innovators.

Super-Fast Connectivity and User Privacy

As it stands, the mobile network operators are largely diversified but more than excited for the new technology. Med hensyn til beskyttelse af personlige oplysninger, the consolidation of power is in the hands of companies, and they should trigger an alarm for the customers.

Godt, 5G should facilitate confidentiality as to where it is required. It must involve multi-context security, and two-factor encryption is needed to control the situation.

Despite the right amount of media coverage, no nation is opposing the new tech-advancement. It would be interesting to see what the democratic government does in the long run and how the corporate body complies with the unfitted access of their citizens.

It would also be interesting to see how the innocuous-seeming technology will be paired by regulatory bodies and how it will challenge the liberal values.





Om forfatteren: Devin Smith

Devin Smith is a tech-mech by profession, and also passionate into finding variant indulgence of the Tech World. He has studied marketing and now turning his exposure into the experience; when you find him playing soccer, it must be his spare hours.

BEMÆRK: The opinions expressed in this guest article do not necessarily reflect SensorsTechForum’s opinion on the subject.

SensorsTechForum Guest Forfattere

SensorsTechForum Guest Forfattere

Fra tid til anden, SensorsTechForum funktioner gæst artikler af cybersikkerhed ledere og entusiaster. Udtalelserne i disse gæst stillinger, dog, er helt de af bidragydende forfatter, og kan afvige de SensorsTechForum.

Flere indlæg

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...