Security Changes in 5G

In 5G networks, SIM cards become optional for some applications, and roaming becomes more traceable and secure for network operators. In addition, the old signaling protocols disappear.
With 5G, there are important changes to the protocols underlying the mobile networks. There are also security changes, mostly on the provider side. The preparations for the new standard have been going on for many years, but gradually 5G is entering the implementation phase .

Substructure
First, the entire substructure is changed. Instead of classic signaling protocols like the notoriously insecure SS7 , 5G uses APIs that regulate traffic between mobile operators. According to Ericsson , the development of applications for the network will be much easier, because classic libraries, developer tools and other tools can be used.
Now, the Diameter protocol is used at LTE SS7, that’s why deployment and LTE roaming took a comparatively long time, because a completely new signaling infrastructure had to be built for this. However, at 5G everything is changed again. Diameter compared to the previous protocol Radius in the security area, especially the encrypted communication using IPsec or TLS.
Most of all major network operators in Europe use firewalls. The new APIs at 5G will further enhance the development and implementation of network technology and bring closer to the usual software development. Continue reading “Security Changes in 5G”