Proceedings of the XXth Conference of Open Innovations Association FRUCT (Apr 2024)

A Comparison of 4G LTE and 5G Network Cybersecurity Performance

  • Sharmeen Izzat Hassan,
  • Mohammed Jasim Mohammed,
  • Alaan Ghazi,
  • Abdullah Mohammed Awad,
  • Haider Mahmood Jawad,
  • Karam Mudhafar Jasim,
  • Ainura Nurmamatovna Mitalipova

DOI
https://doi.org/10.23919/FRUCT61870.2024.10516378
Journal volume & issue
Vol. 35, no. 1
p. 464

Abstract

Read online

Background: The shift from 4G LTE to 5G networks represents a substantial advancement in wireless communication technology, providing improved data transfer rates, decreased response time, and heightened connectedness. Nevertheless, there are significant worries surrounding the cybersecurity of these sophisticated networks. Objective: The objective of this research is to evaluate and contrast the cybersecurity efficacy of 4G LTE and 5G networks, with specific emphasis on data encryption, susceptibility to cyber-attacks, network security protocols, and security operation delays. Methodology: This study employs a blend of actual case studies, simulated scenarios, and an extensive literature analysis to evaluate and contrast the cybersecurity advantages and disadvantages of 4G LTE and 5G networks. Results: The article indicates that 5G networks surpass 4G LTE in aspects such as solid encryption techniques and sophisticated network slicing for enhanced security. However, it also reveals possible cybersecurity obstacles specific to 5G, such as expanded attack surfaces resulting from IoT integration, intricacies in attaining end-to-end encryption, and concerns associated with network function virtualization. Conclusion: 5G networks have enhanced cybersecurity capabilities compared to 4G LTE networks. However, they also present new difficulties that need more study and specific solutions. The report proposes implementing a multi-faceted security strategy that includes technological, organizational, and policy measures to achieve complete cybersecurity in 5G networks. This article is a helpful resource for stakeholders aiming to enhance the security of communication infrastructures.

Keywords