Emerging threats in 5G: How to secure the future of connectivity
1 min read 01 Jun 2023, 07:27 AM ISTExperts warn that while the 5G network offers many benefits, it also poses significant cybersecurity challenges. The rising attack surface and the growing complexity of network architecture create ample opportunities for cybercriminals to exploit vulnerabilities and launch attacks.

5G network, the fifth generation of mobile phone wireless technology capability, has captured attention because of its ability to connect people more frequently and seamlessly than ever. It also offers a higher network speed, more reliable connectivity performance, low latency, and much more benefits. 5G is expected to be in use until 6G is developed.
Every latest technology brings new challenges to cybersecurity threats. Hence, it is important to consider cybersecurity before adopting the new technology. Livemint held a discussion with experts about ways to secure the future of connectivity with the emerging threats in 5G.
Priyanka Kulkarni, Engagement Manager – TMT, Growth Advisory of Aranca said that telecom carriers are investing significantly in network upgrades to enable 5G rollout, however, newly adopted technologies pose security implications.
Citing an example, she said, “As network architecture evolves to the distributed edge cloud, IP connectivity terminates at the edge, making cloud nodes exposed to spoofing and public internet attacks. Users are also more vulnerable to risks from geolocation monitoring and semantic information attacks since 5G networks have a considerably smaller coverage area."
According to Sanjay Kaushik, Managing Director of Netrika Consulting, one of the key challenges in securing 5G networks lies in the increased attack surface resulting from the proliferation of connected devices and the growing complexity of network architecture.
He said that the sheer number of devices and the extensive network infrastructure required to support 5G create ample opportunities for cybercriminals to exploit vulnerabilities and launch sophisticated attacks.
“From distributed denial-of-service (DDoS) attacks to advanced malware and supply chain compromises, the threat landscape becomes more diverse and menacing," Kaushik said.
The Growth Advisory of Aranca further suggested that network operators must first secure prior-generation networks and adopt the zero-trust framework to mitigate potential risks.
“Equipment manufacturers, network operators, and regulatory agencies will need to work closely together to study and implement the 3GPP recommendations to avoid potential network security risks," Kulkarni added.
The Managing Director of Netrika Consulting recommended that one should entail collaboration between technology providers, telecom operators, regulatory bodies, and cybersecurity experts to establish robust security standards, implement effective threat intelligence systems, and continuously monitor and mitigate risks.
Additionally, secure coding practices, encryption protocols, and strong authentication mechanisms must be implemented throughout the network infrastructure and connected devices, he added.
"Exciting news! Mint is now on WhatsApp Channels 🚀 Subscribe today by clicking the link and stay updated with the latest financial insights!" Click here!