Comparative Study of Security Architecture of 5G with 4G

Authors

  • Vaishnavi Bande
  • Sukanya Dhavle
  • Prof. Dr. Shubhalaxmi Joshi

Abstract

This paper presents the comparative study of security architecture of 5G and 4G. Since 5G is a new technology and represents a revolution in network technology, security issues still surround it. When it first emerged during the planning and development of technology, 5G security was the major emphasis. The key factors driving the development of 5G, according to developers worldwide, are the technology's essential characteristics for 5G security: communication, privacy, security, resilience, and identity management.

Base stations are not visible to terminals at the IP layer in the 4G architecture that we are working with. A terminal will send an IP packet to the gateway that connects to all base stations whenever it sends one. Only layer 2 packets between terminals and the gateway are relayed by base stations.

The security elements of this system are designed using fundamental design principles and a risk-based attitude on the part of the developers. Network slicing is the element that is crucial to the development of 5G technology.

With the support of network slicing, virtualization, and cloud-based resources, the 5G security network architecture offers noteworthy high-performance advantages and supports a variety of applications. These benefits will aid organisations in defending against surface assaults and rising security concerns.

In this paper, we have studied the 5G network,4G network and its architecture from a security point of view. Also, study 5G security, 4G security and how 5G is more secure.

Downloads

Download data is not yet available.

References

Dongfeng Fang, Yi Qian, And Rose Qingyang Hu, “Security for 5G Mobile Wireless Networks”, October 25, 2017.

Ishika Sahni, Araftoz Kaur, “A Systematic Literature Review on 5G Security”, 6 December 2022.

Akhil Gupta, And Rakesh Kumar Jhas, “A Survey of 5G Network: Architecture and Emerging Technologies”, July 22, 2015.

Joyce Ayoola Adebusola, Adebiyi Ariyo, Okeyinka Elisha, Adebiyi Olubunmi, Okesola Olatunji Julius,” An Overview of 5G Technology”, Jan 20,2023

S. SULLIVAN1, A. Brighente 3), S. KUMAR 2, and M. CONTI, 3, “5G Security Challenges and Solutions: A Review by OSI Layers”, 2021

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Håkan Englund, and Alexander Zahariev,” A Security Architecture for 5G Networks”, April 2018.

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage,”5G Security: Analysis of Threats and Solutions”, September 2017.

Joe Hoy, “4G vs 5G Security, The Key Differences”, October 16, 2019.

Andy Purdy, “Why 5G Can Be More Secure Than 4G”, Sep 23, 2019.

Usmonov Shukurillaevich, Radjabov Sattorivich, Rustamov Umedjon Amarillo Jonovich, “5G Technology evolution”, January 20,2023.

Sarap Koksal, “Evolution of Core Network (3G vs. 4G vs. 5G)”, November 12, 2019

Nitin Abbey, “5G Network Architecture”, October 13 2022.

Anand R. Prasad, Alf Zugenmaier, Adrian Escott and Mirko Cano Soveri, “3GPP 5G Security”, August 6, 2018

Madhusanka Liyanage, Andrei Gurtov, Ahmed Bux Abro, Edgardo Montes de Oca, “Edgardo Montes de Oca”, December 2015.

https://www.ericsson.com/en/security/a-guide-to-5g-network-security

https://www.gsma.com/security/securing-the-5gera/#:~:text=5G%20-improves%20-confidentiality%20and%20integrity,the%20device%20and%20the%20network.

Additional Files

Published

30-05-2023

How to Cite

Vaishnavi Bande, Sukanya Dhavle, & Prof. Dr. Shubhalaxmi Joshi. (2023). Comparative Study of Security Architecture of 5G with 4G. Vidhyayana - An International Multidisciplinary Peer-Reviewed E-Journal - ISSN 2454-8596, 8(si7), 361–377. Retrieved from http://j.vidhyayanaejournal.org/index.php/journal/article/view/830