In itself, 5G is intended to be more secure than the current standard. A 4G smartphone sends its International Mobile Subscriber Identity (IMSI) in clear, a unique number that identifies a user.
Presenting itself as a dummy base station, an IMSI-catcher can intercept this sensitive data remotely. 5G will encrypt communication from the first exchanges. It will also thwart so-called man-in-the-middle (HDM) attacks which consist, for example, in hijacking a DNS server (DNS spoofing) to redirect its traffic to a pirate DNS server and retrieve its content.
If the fifth generation mobile telephony corrects the flaws of 4G, the new standard will accommodate critical services in the smart city or factory of the future. The explosion in the number of connected objects will also increase the attack surface.
In itself, 5G will therefore not bring new vulnerabilities. On the other hand, the innovative services that it will support will increase the risk surface. “Factory 4.0, smart city, autonomous vehicle … check out Instagram
The uses associated with 5G are particularly critical
The uses associated with 5G are particularly critical”, points out Guillaume Vaquero, senior manager and expert in digital and emerging technologies at Wavestone. “All possible security mechanisms must be implemented to secure sensitive transmissions. There is also a challenge of standardization so that the same level of security is ensured throughout the chain by the various players involved. In the smart city of sensitive communications can be exchanged between water and electricity managers, public carriers