Abstract

As the need grows for mobile solutions that can offer more data throughput with ultra-reliable low-latency communications and better connection density—albeit at risk—private 5G networks and the shift to Industry 4.0 are gaining pace. As 5G technology develops and enterprises start implementing it, they need to be cautious during this transitional phase to make sure they are cognizant of and control risk as their attack surface changes. Many private 5G deployments use 4G/LTE Core networks in Non-Stand-Alone mode, which keeps many of the same vulnerabilities that have been there for years. As a result, private 5G is frequently not fully 5G pure. In this research paper, a few of the present-day weaknesses in the Stream Control Transmission and GPRS Tunnelling protocols—as well as the Industrial Control System protocols—that businesses need to be aware of and safeguard while using these technologies are discussed and shown.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call