Open Access Open Access  Restricted Access Subscription Access

Security Evolution and Threat Mitigation in LTE and Fifth-Generation Mobile Networks

Sinchana G, Sneha G K

Abstract


The transition from 4G LTE to 5G has reshaped both the functioning of mobile networks and the methods used to manage cyber security risks. This work analyses how 4G LTE and 5G networks handle serious security risks including data leaks, illegal access attempts, signaling misuse, and vulnerabilities in both core and radio access components. Although 4G LTE improved encryption and mutual authentication, its centralized design remained vulnerable to single-point failures and struggled to scale against emerging threats.  Unlike LTE, 5G uses a distributed and software-based architecture that includes network slicing, virtualized functions, edge computing, and support for a large number of connected devices. While these features significantly enhance network performance and flexibility, they also increase the potential attack surface. The analysis shows that with stronger cryptographic techniques, a distributed architecture, and enhanced identity protection, 5G provides a more robust security base than 4G LTE. However, the extensive use of virtualization and software-driven elements introduces new risks such as misconfigurations, supply-chain vulnerabilities, and threats targeting orchestration layers. The Overall security effectiveness of 5G depends largely on proper deployment practices, continuous monitoring, and regularly updated protection strategies to fully realize next-generation network benefits.


Full Text:

PDF

References


J. Cao, L. Zhang, and Y. Lin, “Security analysis of 4G LTE networks: Vulnerabilities and countermeasures,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1550–1572, 2020.

S. Chandrasekhar et al., “A review on 5G network security: Challenges, threats, and solutions,” IEEE Access, vol. 9, pp. 119–145, 2021.

3GPP, “Technical specification: 5G Security architecture and procedures,” 3GPP TS 33.501, Release 16, 2021.

3GPP, “Security architecture for LTE and EPC,” 3GPP TS 33.401, Release 15, 2019.

P. K. Sharma and J. H. Park, “Blockchain-based authentication for secure 5G,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8472–8481, 2019.

R. Khan et al., “5G security: Analysis of threats and solutions,” IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 47–55, 2018.

A. Siddiqa and A. Singhal, “Cyberattack surface in 4G and 5G mobile networks,” Journal of Network and Computer Applications, vol. 196, 2021.

H. Ruohonen, “LTE protocol weaknesses and IMSI catcher threats,” Computers & Security, vol. 105, 2021.

M. Z. Hasan et al., “5G network slicing security: A survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2460–2500, 2021.

A. Alshahrani, “Impacts of SDN and NFV on 5G core security,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1650–1662, 2021.


Refbacks

  • There are currently no refbacks.