5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authentication, the initial step in securing access to 5G network environments. For the 5G primary authentication, two protocols, namely 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′), were proposed and standardized, where the former is for 3GPP devices, and the latter is for non-3GPP devices. Recent scrutiny has unveiled vulnerabilities in the 5G-AKA protocol, exposing it to security breaches, including linkability attacks. Moreover, mobile communication technologies are dramatically evolving while 3GPP has standardized Authentication and Key Management for Applications (AKMA) to reuse the credentials, generated during primary auth
At Hill Air Force Base in Utah, researchers from MIT Lincoln Laboratory performed one of the first red-teaming campaigns against 5G in the field to assess networking vulnerabilities for military applications.
Palo Alto Networks: We offer 5G-native security — a first-of-its-kind 5G-focused security platform to safeguard these advances. It brings together our expertise in securing networks, clouds and devices to the 5G world, enabling service providers and enterprises to turn 5G networks into highly secure networks.
GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: New technology always brings a host of worries about its negative potential, and 5G is no diffe.