It was noted in the papers that the 5G network is built on easily accessible and open internet protocols and that it inherits all the vulnerabilities from previous generations that make it vulnerable to cyber-attacks and compromise the security of the entire system.
“As cryptocurrencies and decentralized banking systems become increasingly popular using the real-time 5G networks, the links and financial trail will be challenging to trace.
“The 5G can provide an excellent platform for the intermediaries and agents to make links for crimes such as drug trafficking, human and organ trafficking, money laundering, terrorism financing, etc,” the papers said.
In addition to the Prime Minister, the three-day annual conference was attended by the Union Home Secretary
The core of the 5G network is built on easily accessible and open internet protocols such as HTTP and Transport Layer Security (TLS). In a Network-Slicing environment, different sub-networks have different natures of cybersecurity.
Keys for encryption of the radio interface are delivered over unsecured routes. Vulnerabilities such as IDOR (Insecure Direct Object Reference) can arise.
“The Telco cloud is vulnerable to cyber-attacks, which can compromise the security of the network and data stored in the cloud,” the papers said.
Network function virtualization (NFV) allows criminals to use or execute attacks to access and even change phone numbers (target lists) for monitoring.
There are several improvements in 5G that support such remote control functions as drones, robotic surgery, etc., but criminals can also exploit this aspect.
Another problem with 5G is the operations of edge computing, where processing takes place on decentralized interconnecting nodes close to the user network.
This furthers the problem of data collection for security settings as there is no central node through which data passes.
The papers said 5G could support millions of Artificial Intelligence (AI) based Internet of Things (
Cybercrime such as mobile network mapping, distributed denial of service, battery drain, service degradation, mobile IMSI capture, malware injection, CnC creation, communication interception, DNS spoofing, uplink and downlink impersonations, etc can be carried out more easily, the newspapers said.
“During the initial transition phase, future 5G networks will inherit all vulnerabilities from previous generations.”
There is a chance that end-to-end encryption (E2ER) will be incorporated into the standard during the upcoming standardization process, posing a challenge for law enforcement agencies.
The IPS officials wrote that the manufacturers of 5G equipment would try to sell the valuable data to the marketers for targeted advertising and that this should be monitored to ensure it does not fall into the wrong hands.
Holistic cybersecurity is the only solution for this new ecosystem created by 5G. From core devices to network layers, IoTs and the user’s mobile devices or devices, everything should be viewed as a potential attack point.
Suggesting safety precautions, the IPS officials noted that consumer education about IoT security is necessary and that equipment should be purchased from reliable sources and not from suspicious sources such as China.
“The mobile operators must adopt a hybrid cloud-based approach where sensitive data is stored locally and less sensitive data is stored in the cloud. Network operators must be alert to the need for resilience of their infrastructure to cope with power outages, natural disasters, misconfiguration etc.’, according to the newspapers.
Maruti Suzuki’s third quarter net profit jumps 133% to ₹2,351 crore on lower input costs
PlayStation 5 Pro with a new chipset and liquid cooling is expected to launch in April 2023