International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 2 (March-April 2026) Submit your research before last 3 days of April to publish your research paper in the issue of March-April.

Security and Threat Mitigation in 5G Core and RAN Networks

Author(s) Varinder Kumar Sharma
Country United States
Abstract The next generation of mobile communication technology, known as 5th Generation (5G), is being developed as a game-changing technology for wireless communication, offering extreme mobile broadband, ultra-reliable low-latency communication, and massive machine-type communication. Unlike what came before, 5G is distinguished not just by a speed and capacity upgrade, but by transitional architectural changes to software-defined networking (SDN), network function virtualization (NFV), and service-based architecture (SBA) in the core, and a much more intelligent and embedded radio access network (RAN). While these technologies open up a spectrum of applications in sectors such as healthcare, automotive, and industrial automation, they also create a vast array of security threats and vulnerabilities that need to be urgently addressed.
5G’s core and RAN architectures are far more dynamic and virtualized than previous generations, which significantly increases the attack surface for bad actors. Key elements, such as AMF, SMF, and NEF, provide programmable interfaces that can be potentially exploited, if not adequately secured, via signaling storms, injection attacks, and lateral movement-based attacks by attackers. Likewise, the disaggregated RAN, comprising CU, DU, and RU, for instance, can also be exposed to rogue base station attacks, man-in-the-middle attacks, and synchronization-based DoS attacks. Additionally, network slicing, a core aspect of 5G, can result in inter-slice leakage or isolation violation if appropriate multi-tenancy security policies are not enforced.
Keywords 5G Security, Radio Access Network (RAN), 5G Core Network, Network Function Virtualization (NFV), Software-Defined Networking (SDN), Zero Trust Architecture (ZTA), Network Slicing, Threat Detection, Service-Based Architecture (SBA), Authentication and Encryption, Supply Chain Security, Artificial Intelligence in 5G Security, Man-in-the-Middle Attacks, Denial of Service (DoS), 3GPP Security Standards.
Field Engineering
Published In Volume 3, Issue 5, September-October 2021
Published On 2021-09-06
DOI https://doi.org/10.36948/ijfmr.2021.v03i05.54992

Share this