Overview of 5G Security and Vulnerabilities
By Shane Fonyi
| March 23, 2020
The 5G wireless standard is currently in development and is slowly being rolled out to a few cities in the United States. There has been a concern for the security and overall architecture of the 5G standard from industry professionals and government officials. This paper will summarize the research done in the 5G security space and will provide an overview of the technologies used in 5G, the security built into 5G, and the vulnerabilities of 5G. The specific vulnerabilities researched are classified into the three pinnacle components of information security: confidentiality, integrity, and availability. The use of Internet of Things devices, medical collection devices, and massive device-to-device communications will also be discussed.
FULL ARTICLE HERE