5G networks and security: Risks and methods of protection

5G network security: What new risks and opportunities does it bring to business?

Write to us

The fifth generation of mobile networks, known as 5G, is much more than an evolution and faster internet on our smartphones. It is a technological revolution that has the potential to fundamentally change entire industries and become the bloodstream for the fourth industrial revolution (Industry 4.0). 5G is not one, but three promises: gigabit speeds (eMBB), ultra-low latency near zero (URLLC) and the ability to support millions of devices per square kilometer (mMTC). This is the technology that will open the door to autonomous factories, smart cities, remote-controlled surgery and a truly massive Internet of Things (IoT).

However, this immense power and flexibility comes at a price. The 5G architecture, unlike its predecessors, is largely based on software, virtualization and cloud technologies. It’s a break from the traditional hardware-based model for building telecommunications networks, which, while bringing huge benefits, also creates a whole new, much more complex and dynamic attack surface. Understanding these new risks and building security into the very fabric of a 5G network from the outset is crucial to fully and securely realize its enormous potential.

What is 5G technology and why is it much more than just faster mobile internet?

While previous generations of mobile networks (3G, 4G/LTE) focused primarily on one goal – to provide ever-faster Internet access for humans – 5G was designed from the ground up with three, very different usage scenarios in mind, which together are expected to revolutionize machine and human communications.

  1. eMBB (Enhanced Mobile Broadband): this is the aspect that is most visible to the average user. It represents a huge increase in bandwidth, allowing download speeds of gigabit. This will enable 8K video streaming, virtual and augmented reality (VR/AR) on a massive scale.
  2. URLLC (Ultra-Reliable Low-Latency Communications): This is probably the most revolutionary aspect of 5G. It guarantees extremely low latency (less than 1 millisecond) and very high reliability of the connection. This is crucial for critical applications such as communication between autonomous vehicles (V2X), remote control of industrial robots or telesurgery.
  3. mMTC (Massive Machine-Type Communications): This pillar focuses on the ability to simultaneously support huge numbers (up to a million per km²) of simple, low-power devices. This is the foundation for the massive Internet of Things (IoT) and smart cities (smart cities), where thousands of sensors, meters and other small devices must be constantly connected to the network.

It is the combination of these three capabilities in a single technology that makes 5G a platform for entirely new business models, not just faster internet.


How is the 5G architecture fundamentally different from previous generations (4G/LTE)?

The biggest revolution in 5G is not about antennas or radio waves, but about the heart of the network itself, the so-called core network. The architecture of 4G and older generations was largely monolithic and based on dedicated, specialized and expensive hardware (hardware) from a few dominant manufacturers. Each network function, such as mobility management or routing, was handled by a separate physical “box.”

The architecture of the 5G core is quite different. It is designed based on paradigms familiar from the IT and cloud world. Two key concepts are NFV (Network Functions Virtualization) and SDN (Software-Defined Networking).

  • NFV means that network functions that used to be performed by physical devices now become software (applications) that can be run on standard commercial off-the-shelf (COTS) servers.
  • SDN means that the network control layer (the brain) is separated from the data transmission layer (the muscle). This allows the entire network to be centrally and programmatically managed by software.

As a result, the 5G network ceases to be a collection of rigid, hardware-based components and becomes a flexible, virtualized and software-defined platform. It is this flexibility that allows for services as diverse as URLLC and mMTC, but at the same time introduces new and complex security risks.


What new attack vectors and threats are introduced by network functions virtualization (NFV) and software-defined networking (SDN)?

The shift to NFV and SDN-based architectures, while extremely beneficial from a flexibility and cost perspective, opens the door to a whole new class of threats, well known from the IT and cloud worlds, but hitherto foreign to the closed world of telecommunications.

Virtualization (NFV) means that the entire network runs on standard servers and operating systems that have their own vulnerabilities. Rather than trying to breach specialized telecommunications hardware, an attacker can now exploit well-known vulnerabilities in hypervisors (e.g. VMware, KVM), operating systems (Linux) or container management platforms (Kubernetes) to take control of key network functions.

Software-defined networking (SDN) creates one extremely powerful target for attackers – the SDN controller. It is the central “brain” that manages the entire network. Taking control of it gives attackers absolute power – they can redirect traffic at will, eavesdrop on all communications, disable portions of the network or launch man-in-the-middle attacks on a massive scale. Securing the SDN controller and its communications becomes an absolutely critical challenge. Moreover, the sheer complexity and plethora of APIs in this architecture creates new potential entry points for hackers.


What is “network slicing” and what security risks are involved?

Network slicing is one of the most revolutionary capabilities of the 5G architecture. It allows an operator to dynamically create multiple independent, virtual “end-to-end” networks on the basis of a single, shared physical infrastructure. Each such “slice” can be precisely tailored to the requirements of a specific service. For example, one can create:

  • One slice for eMBB services (smartphones), optimized for maximum throughput.
  • The second slice for URLLC services (autonomous vehicles), with a guarantee of ultra-low delays.
  • A third slice for mMTC services (IoT sensors), optimized to support a huge number of connections.

From a security perspective, network slicing is a double-edged sword. On the one hand, isolation between slices is a powerful security mechanism. An incident in one slice (e.g., a massive DDoS attack on IoT devices) should theoretically not affect the operation of another critical slice (e.g., for emergency communications).

On the other hand, there is the risk of “jumping” between slices. If isolation mechanisms (implemented at the virtualization level) prove to be flawed or vulnerable to attack, a hacker who has compromised a less secure slice (e.g., for the guest Internet) may be able to access resources in a much more critical slice. Ensuring robust and verified isolation between virtual networks is one of the biggest challenges in secure 5G deployment.


What are private 5G networks (campus networks) and what security challenges do they pose for companies?

One of the biggest opportunities 5G presents for business is the ability to build private, dedicated 5G networks (often called campus or non-public networks). Instead of relying on a public carrier network, a large factory, port, mine or university campus can deploy its own fully controlled 5G infrastructure to connect its machines, robots, sensors and employees. This guarantees coverage, performance and low latency that are impossible to achieve on public networks.

However, having its own 5G network also means taking full responsibility for its security. The company becomes a de facto small telecom operator. This creates a number of entirely new challenges that traditional IT departments have never had to deal with.

These challenges include:

  • Security of the core network (5G Core): Need to secure virtualized network components, SDN controllers and orchestration platform.
  • Radio network security (RAN): Protecting base stations from physical and digital attacks, securing radio interfaces.
  • SIM/eSIM card security: Lifecycle management and credential (SIM card) security for thousands of devices.
  • IT/OT network integration: The need to securely connect the new 5G network to existing corporate infrastructure, especially sensitive industrial control (OT) systems.
New Risks and Protective Measures in 5G Architecture
Key Element of 5G ArchitectureNew Security RisksRecommended Protective Measures
Virtualization (NFV/SDN).Attacks on hypervisor, operating systems, containers. Compromising the SDN central controller.Hardening (hardening) of the virtualization platform, microsegmentation inside the telco cloud, rigorous control of access to the controller.
Network SlicingPotential “slice hopping” between slices in case of poor insulation.Use of strong isolation mechanisms at the hypervisor and network level, dedicated security functions per slice.
Mass IoT (mMTC)Huge attack surface, poorly secured IoT devices, risk of DDoS attacks using IoT botnets.Secure device onboarding, network segmentation, monitoring for anomalous device behavior, NAC systems.
Private campus networksThe company takes full responsibility for the security of the complex telecommunications infrastructure.Holistic security strategy, Zero Trust architecture, integration of 5G monitoring with the company’s SOC/SIEM, collaboration with experts.

About the author:
Łukasz Szymański

Łukasz is an experienced professional with a long-standing career in the IT industry. As Chief Operating Officer, he focuses on optimizing business processes, managing operations, and supporting the long-term growth of the company. His versatile skills encompass both technical and business aspects, as evidenced by his educational background in computer science and management.

In his work, Łukasz adheres to the principles of efficiency, innovation, and continuous improvement. His approach to operational management is grounded in strategic thinking and leveraging the latest technologies to streamline company operations. He is known for effectively aligning business goals with technological capabilities.

Łukasz is, above all, a practitioner. He built his expertise from the ground up, starting his career as a UNIX/AIX systems administrator. This hands-on technical knowledge serves as a solid foundation for his current role, enabling him to deeply understand the technical aspects of IT projects.

He is particularly interested in business process automation, cloud technology development, and implementing advanced analytics solutions. Łukasz focuses on utilizing these technologies to enhance operational efficiency and drive innovation within the company.

He is actively involved in team development, fostering a culture of continuous learning and adaptation to changing market conditions. Łukasz believes that the key to success in the dynamic IT world lies in flexibility, agility, and the ability to anticipate and respond to future client needs.