Presentation Material
Abstract
This talk provides practical insights into the first phase of commercial 5G networks across the world. The emphasis is placed on the security issues that have been identified in the previous generations and may still prevail in 5G networks. Although major security improvements have been carried out by the standardization bodies, they differ in implementations. Experimental findings are provided to illustrate how secure 5G networks are compared to their previous generations and what to expect in the second phase of 5G networks.
AI Generated Summarymay contain errors
Here is a summarized version of the content:
The speaker discussed the security of 5G networks, specifically highlighting vulnerabilities in IoT (Internet of Things) networks. They mentioned that even with improved security features in 5G, there are still risks due to the use of non-5G protocols and the lack of standardization. The speaker also emphasized that end-users cannot choose to only use 5G networks, as it is not a feature provided by operators or phone manufacturers.
The talk also touched on the penetration testing of IoT networks, where the speaker’s team was able to intrude into six or seven networks and reach mobile devices or other devices on the same platform. This vulnerability poses significant security risks.
In conclusion, the speaker highlighted that 5G security is not yet fully implemented, and even with improved features, there are still risks due to non-standardized protocols. They also mentioned that new security domains, such as virtualization, APIs, clouds, and SDN, will become important in cellular networks.
During the Q&A session, the speaker addressed questions about VPN clients, edge computing, and the security of 5G APIs compared to 4G and 3G.