International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
Conferences Published ↓
IC-AIRCM-T3-2026
SPHERE-2025
AIMAR-2025
SVGASCA-2025
ICCE-2025
Chinai-2023
PIPRDA-2023
ICMRS'23
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 8 Issue 2
March-April 2026
Indexing Partners
Security and Threat Mitigation in 5G Core and RAN Networks
| Author(s) | Varinder Kumar Sharma |
|---|---|
| Country | United States |
| Abstract | The next generation of mobile communication technology, known as 5th Generation (5G), is being developed as a game-changing technology for wireless communication, offering extreme mobile broadband, ultra-reliable low-latency communication, and massive machine-type communication. Unlike what came before, 5G is distinguished not just by a speed and capacity upgrade, but by transitional architectural changes to software-defined networking (SDN), network function virtualization (NFV), and service-based architecture (SBA) in the core, and a much more intelligent and embedded radio access network (RAN). While these technologies open up a spectrum of applications in sectors such as healthcare, automotive, and industrial automation, they also create a vast array of security threats and vulnerabilities that need to be urgently addressed. 5G’s core and RAN architectures are far more dynamic and virtualized than previous generations, which significantly increases the attack surface for bad actors. Key elements, such as AMF, SMF, and NEF, provide programmable interfaces that can be potentially exploited, if not adequately secured, via signaling storms, injection attacks, and lateral movement-based attacks by attackers. Likewise, the disaggregated RAN, comprising CU, DU, and RU, for instance, can also be exposed to rogue base station attacks, man-in-the-middle attacks, and synchronization-based DoS attacks. Additionally, network slicing, a core aspect of 5G, can result in inter-slice leakage or isolation violation if appropriate multi-tenancy security policies are not enforced. |
| Keywords | 5G Security, Radio Access Network (RAN), 5G Core Network, Network Function Virtualization (NFV), Software-Defined Networking (SDN), Zero Trust Architecture (ZTA), Network Slicing, Threat Detection, Service-Based Architecture (SBA), Authentication and Encryption, Supply Chain Security, Artificial Intelligence in 5G Security, Man-in-the-Middle Attacks, Denial of Service (DoS), 3GPP Security Standards. |
| Field | Engineering |
| Published In | Volume 3, Issue 5, September-October 2021 |
| Published On | 2021-09-06 |
| DOI | https://doi.org/10.36948/ijfmr.2021.v03i05.54992 |
Share this

E-ISSN 2582-2160
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
Powered by Sky Research Publication and Journals