🤬
  • ■ ■ ■ ■
    README.md
    skipped 70 lines
    71 71  
    72 72   • Stronger air interface security: In addition to user data encryption on 2G, 3G, and 4G networks, 5G
    73 73   standards provide user data integrity protection to prevent user data from being tampered with.
     74 +
    74 75   • Enhanced user privacy protection: In 2G, 3G, and 4G networks, users' permanent IDs (international mobile
    75 76   subscriber identities — IMSIs), are transmitted in plain text over the air interface. Attackers can exploit this
    76 77   vulnerability using IMSI catcher attacks to track users. In 5G networks, users' permanent IDs (in this case,
    77 78   SUPIs) are transmitted in ciphertext to defend against such attacks.
     79 +
    78 80   • Better roaming security: Operators usually need to set up connections via third-party operators. Attackers
    79 81   can forge legitimate core network nodes to initiate Signaling System 7 and other attacks by manipulating
    80 82   third-party operators' devices. 5G SBA defines Security Edge Protection Proxy (SEPP) to implement E2E
    81 83   security protection for inter-operator signaling at the transport and application strata. This prevents thirdparty operators' devices from tampering with sensitive data (e.g. key, user ID, and SMS) exchanged
    82 84   between core networks.
     85 +
    83 86   • Enhanced cryptographic algorithms: 5G R15 standards currently define security mechanisms such as 256-
    84 87   bit key transmission. Future 5G standards will support 256-bit cryptographic algorithms to ensure that such
    85 88   algorithms used on 5G networks are sufficiently resistant to attacks by quantum computers. The 3GPP
    86 89   has recommended that the ETSI Security Algorithms Group of Experts (SAGE) start to evaluate 256-bit
    87 90   cryptographic algorithms.
    88 91   ```
    89  - 
     92 + source: [Huawei: 5G Security Assurance](https://huawei.eu/file-download/download/public/1442#:~:text=4.1-,Industry%2Dleading%20Security%20Measures%20for%20the%20Access%20Network,security%20mechanisms%20used%20in%204G.&text=5G%20inherits%20security%20protection%20mechanisms,tampering%20on%20the%20user%20plane.)
    90 93  - Security Research and Result
    91 94   ```
    92 95   - Purdue University and the University of Iowa
    skipped 12 lines
Please wait...
Page is in error, reload to recover