5G Ups the Stakes in Cybersecurity War

SHARE THIS ARTICLE

Political leaders and members of the media have stressed the importance of building out 5G wireless quickly. However, it is equally, if not more, important to focus on securing this next generation network, Vinod Kumar, Associate Director of Tata Communications, recently wrote in Forbes Magazine. He outlined three major vulnerabilities of 5G, including increased attack surfaces, a lack of IoT security and dynamic spectrum sharing, as well discussing their mitigations.

“5G will be released as an all-software network that can be maintained like any other digital system today,” Kumar wrote. “Because of software’s innate vulnerabilities, the ecosystem of 5G applications could pose a serious security risk, not just to individuals but also to the nation.” 

A 5G network simply has more attack surfaces, which are traffic routing points that provide access to location tracking and cellular reception. Each of these access points can be exploited by a hacker for an attack on the network. 

“5G technologies require a complete overhaul of network security, which isn’t possible without significant funding and executive support,” Kumar wrote. This is a shared responsibility between both governments and 5G businesses. Government policies need to take into account where the market falls short and how it can be addressed. We need to invest now — before we’re caught with no sustainable cybersecurity plans in place.”

IoT devices, manufactured without cybersecurity, have been used by hackers to enter enterprise networks. Unsecured household IoT devices, which connect to the internet automatically, can  allow for man-in-the-middle attacks, intercepting sensitive communication over 5G. These devices should be overseen by a regulatory body, according to Kumar, special measures should be made for low-end IoT brands, including consumer warning labels.

“It’s important to plan for a scenario where IoT manufacturers may still not comply with new regulatory frameworks,” Kumar wrote. “Incentives like market monopoly or logistics support for complying brands will be required to effectively regulate the IoT market.”

Good fences make good neighbors. But 5G does not have the network partitioning that 4G uses to quarantine attacks. Each small cell antenna in a 5G network can become the focus of a Botnet or denial of service (DDoS) attack. In addition, each network slice created by 5G’s dynamic spectrum sharing is at risk to a cyber attack. The network, however, can be taught to defend itself, using artificial intelligence and machine learning in network management, according to Kumar.

“The dynamic nature of 5G’s network architecture requires a dynamic and fast-learning management system,” Kumar wrote. “AI-powered cyber solutions will continue learning and updating themselves. AI and machine learning can serve as powerful tools for 5G cybersecurity.”

By J. Sharpe Smith Inside Towers Technology Editor

Reader Interactions

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.