The hype around 5G seems everywhere , and in many cases, for very good reasons. As good as 5G is, however, adopters of 5G technology must continue to be vigilant toward security vulnerably – particularly as the first generation of 5G rolls out.
5G is an amazing evolution in wireless capability.During the 1G and 2G years, we were giddy to cut the phone cord and enjoy our voice calls on the move. As our appetite for mobile computing grew, so did our appetite for mobile data. 3G and 4G wireless evolutions focused on moving data and delivering computing power for our smart phones and applications. Still, even with 4G LTE, we used our mobile internet connectivity at one speed– as fast as we could go. Never mind that our insatiable need for data was choking some parts of our networks while other parts were hardly used. What we needed now is a system that matches different applications and use cases to the best means and connectivity available. Enter 5G, delivering an optimized pathway specially tailored to each application ranging from autonomous vehicles to telemedicine and swarms of delivery drones. With updates in frequency bands, faster electronics, software.
defined networks, and new security features, 5G delivers 100 times the speed, lower latency, higher reliability, and significantly higher device densities. With 5G, your mobile smart phone will be faster than ever, but more importantly, applications traditionally relegated to hardlineconnectivity can be dependably and securely wireless.
The 5G evolution enables a revolution in wireless capability for applications. A bold statement, but here are a few examples. Today, self-driving cars can make it slowly down the street by themselves, but millions of cars at high-speed need very reliable mobile connectivity to communicate with cars and traffic systems around them. 5G delivers the connectivity.Surgeons can’t be everywhere, particularly in hazardous situations, but telesurgery robots operated by a remote might one day be. This requires very low latency and precise control - 5G is the enabler. Our aircraft become high speed communications hubs in the sky thanks to the connectivity 5G enables, while thousands of unpiloted aerial vehicles (UAVs) deliver packages in hours or minutes. 5G provides nationwide connectivity for these UAVs.
With each generation of wireless connectivity, we’ve been greeted with By Carl Kutsche, Director, Strategic Technology Integration at Idaho National Laboratory IS AWESOME! – Continued Security Vigilance Needed 5G security threats and vulnerabilities. 4G LTE was a major step in the right security direction, but there were still concerning issues. Rogue base stations could intercept calls, jamming could wipe out connectivity for blocks, mobile devices could connect with and attack other mobile devices, digital voice over LTE (VOLTE) was susceptible to intercept, streaming media content providers could be ransomed , and architectured private networks were vulnerable to compromise and denial of service attacks.
These threats still exist within the first generations of 5G. The initial 5G systems we have today (called 5G Non-Stand Alone, or 5G NSA) use the existing 4G cores that still contain many of these vulnerabilities. Second, 5G enables a relatively new network construct, the private enterprise network. Security on these private enterprise networks can be left to individual companies and application developers, some not as security savvy as national wireless carriers.Finally, 5G enables an exponential growth in the number of connected physical devices, not just cell phones or mobile tablets. Additionally, the number and variety of device and applicationcode developers is growing rapidly. While major cell phone manufacturershave thorough securitydevelopment procedures,small startup businesses often lack the same resources to design, develop, test, and deliver devicesand apps with adequate security.


