{"id":23178,"date":"2024-01-03T16:47:49","date_gmt":"2024-01-03T16:47:49","guid":{"rendered":"https:\/\/www.5gworldpro.com\/?p=23178"},"modified":"2024-01-03T16:47:49","modified_gmt":"2024-01-03T16:47:49","slug":"what-are-the-major-security-threats-to-the-5g-air-interface","status":"publish","type":"post","link":"https:\/\/new.5gworldpro.com\/?p=23178","title":{"rendered":"What are the major security threats to the 5G air interface?"},"content":{"rendered":"<div id=\"EN-US_TOPIC_0000001218513058\" class=\"nested0\" xml:lang=\"en-us\">\n<div id=\"EN-US_TOPIC_0000001218513058_mMcCpPsS_body8662426\" class=\"topicbody\">\n<p id=\"EN-US_TOPIC_0000001218513058__p255092111182\">5G introduces new architectures, services, and technologies to meet the increasingly stringent requirements on experience and applications. However, these additions also bring with them new security challenges. For example, the new software architecture has its own security requirements in aspects such as slice security protection and multi-slice risk management. In terms of new services, 5G networks need to support applications with enhanced security capabilities to meet the security requirements of vertical industries. And in terms of new technologies, 5G networks must consider the future impact of technologies, such as quantum computing, on traditional cryptographic algorithms.<\/p>\n<div id=\"EN-US_TOPIC_0000001218513058__fig174934917354\" class=\"fignone\"><span class=\"figcap\"><span class=\"figurenumber\">Figure 1<\/span>\u00a0Evolution of air interface security features<\/span><br \/>\n<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-23181 size-full\" src=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1.png\" alt=\"\" width=\"649\" height=\"658\" srcset=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1.png 649w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1-296x300.png 296w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1-414x420.png 414w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1-150x152.png 150w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/figure-1-300x304.png 300w\" sizes=\"(max-width: 649px) 100vw, 649px\" \/><\/div>\n<p id=\"EN-US_TOPIC_0000001218513058__p9963420133212\">As the successor of 4G networks, 5G needs to be able to handle new security challenges while maintaining the same security capabilities as 4G. For this purpose,\u00a0<strong id=\"EN-US_TOPIC_0000001218513058__b19151183919576\">3GPP specifications enable 5G to inherit and enhance the security mechanisms of 4G as well as provide additional security features for 5G applications in vertical industries<\/strong>. This is explained in more detail in\u00a03 Security Threats to the 5G Air Interface and Corresponding Countermeasures\u00a0and\u00a04 5G Security Features for Vertical Industries.<\/p>\n<p id=\"EN-US_TOPIC_0000001218513058__p4965656154617\">In addition, unified and continuously evolving security assessment standards are required for 5G networks, in turn facilitating improvements in security levels across the mobile industry.\u00a05 Wireless Network Equipment Security Certification\u00a0introduces the industry&#8217;s most recognized standards and specifications for equipment security assessment.<\/p>\n<\/div>\n<\/div>\n<div id=\"EN-US_TOPIC_0000001262949657\" class=\"nested0\" xml:lang=\"en-us\">\n<h1 class=\"topictitle1\"><a><span class=\"topictitlenumber1\">3<\/span>\u00a0Security Threats to the 5G Air Interface and Corresponding Countermeasures<\/a><\/h1>\n<div id=\"body55694143\" class=\"topicbody\">\n<p id=\"EN-US_TOPIC_0000001262949657__p1710231114331\">The main security threats to the air interface are the same between 4G and 5G. To cope with these threats, 5G uses the same security mechanisms as 4G and makes some additional enhancements.\u00a0<a>Figure 3-1<\/a>\u00a0shows the major security threats to the 5G air interface.<\/p>\n<div id=\"EN-US_TOPIC_0000001262949657__fig83631618194719\" class=\"fignone\"><span class=\"figcap\"><span class=\"figurenumber\">Figure 2<\/span>\u00a0Major security threats to the 5G air interface<\/span><br \/>\n<img decoding=\"async\" class=\"alignnone wp-image-23182 size-full\" src=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE2.png\" alt=\"\" width=\"664\" height=\"349\" srcset=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE2.png 664w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE2-300x158.png 300w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE2-150x79.png 150w\" sizes=\"(max-width: 664px) 100vw, 664px\" \/><\/div>\n<div id=\"EN-US_TOPIC_0000001262949657__section395919519432\" class=\"section\">\n<h2 class=\"sectiontitle\">Fake Base Station Attack<\/h2>\n<p id=\"EN-US_TOPIC_0000001262949657__p1464118117331\">On 2G, 3G, and 4G networks, an international mobile subscriber identity (IMSI) is used to uniquely identify a mobile subscriber or UE. An IMSI is a permanent identity of a subscriber. IMSIs are transmitted in plaintext on 2G, 3G, and 4G networks and can be obtained in attacks launched by devices such as an IMSI-catcher, leading to subscriber identity disclosure. An attacker, with an IMSI obtained in advance, can use a fake base station to forge a signaling message and determine whether the UE is near the fake base station based on the response from the UE. In this way, the attacker can illegally trace the UE location.<\/p>\n<p id=\"EN-US_TOPIC_0000001262949657__p49401638105520\"><strong id=\"EN-US_TOPIC_0000001262949657__b164191120337\">5G networks use a subscription permanent identifier (SUPI), which consists of an IMSI or network access identifier (NAI), to uniquely identify a mobile subscriber or UE. A SUPI is encrypted into a Subscription Concealed Identifier (SUCI) for transmission to defend against IMSI-catcher attacks by fake base stations.<\/strong><\/p>\n<div id=\"EN-US_TOPIC_0000001262949657__fig13187185111394\" class=\"fignone\"><span class=\"figcap\"><span class=\"figurenumber\">Figure 3<\/span>\u00a0Fake base station attacks and corresponding countermeasures<\/span><\/div>\n<div class=\"fignone\"><img decoding=\"async\" class=\"alignnone wp-image-23183 size-full\" src=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3.png\" alt=\"\" width=\"665\" height=\"837\" srcset=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3.png 665w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3-238x300.png 238w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3-334x420.png 334w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3-150x189.png 150w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE3-300x378.png 300w\" sizes=\"(max-width: 665px) 100vw, 665px\" \/><\/div>\n<\/div>\n<div id=\"EN-US_TOPIC_0000001262949657__section1279282214114\" class=\"section\">\n<h2 class=\"sectiontitle\">Access of Unauthorized Users<\/h2>\n<p id=\"EN-US_TOPIC_0000001262949657__p370564916221\">Unauthorized users using unauthenticated UEs to access the network will consume network resources. If an attacker uses a large number of unauthorized UEs to launch an attack against the network, severe accidents such as network congestion, denial of service, and network device faults may occur.<\/p>\n<p id=\"EN-US_TOPIC_0000001262949657__p414294620567\">Both 5G and 4G support two-way authentication between UEs and the network. However, 5G provides a unified authentication architecture for 3GPP and non-3GPP authentication to adapt to different UE types and network access types. In addition, 5G uses better authentication modes to improve air interface access security.<\/p>\n<div id=\"EN-US_TOPIC_0000001262949657__fig17232113419167\" class=\"fignone\"><span class=\"figcap\"><span class=\"figurenumber\">Figure 4<\/span> Differences between 4G and 5G authentication architectures<br \/>\n<\/span><\/div>\n<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-23184 size-full\" src=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE5.png\" alt=\"\" width=\"581\" height=\"423\" srcset=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE5.png 581w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE5-300x218.png 300w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE5-577x420.png 577w, https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/FIGURE5-150x109.png 150w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><\/div>\n<div id=\"EN-US_TOPIC_0000001262949657__section1279282214114\" class=\"section\">\n<div id=\"EN-US_TOPIC_0000001262949657__p12581221649\" class=\"p\">\n<p>5G authentication-related network functions (NFs) are as follows:<\/p>\n<ul id=\"EN-US_TOPIC_0000001262949657__ul72581322417\">\n<li id=\"EN-US_TOPIC_0000001262949657__li325802146\">Unified data management (UDM) and Authentication Credential Repository and Processing Function (ARPF): The UDM and ARPF are co-deployed. The co-deployed node generates 5G authentication parameters and vectors based on the stored subscriber root keys and authentication-related subscription data.<\/li>\n<li id=\"EN-US_TOPIC_0000001262949657__li142581727416\">Authentication server function (AUSF): The AUSF selects an authentication mode based on the network access type.<\/li>\n<li id=\"EN-US_TOPIC_0000001262949657__li9642173117588\">Access and mobility management function (AMF) and Security Anchor Function (SEAF): The AMF and SEAF are co-deployed. The co-deployed node derives lower-layer keys based on the anchor key and confirms the serving network authentication result in 5G Authentication and Key Agreement (AKA) authentication mode.<\/li>\n<\/ul>\n<\/div>\n<div class=\"tablenoborder\">\n<p><span class=\"tablecap\"><span class=\"tablenumber\">Table 3-1<\/span>\u00a0Differences between 4G and 5G authentication modes<\/span><\/p>\n<table id=\"EN-US_TOPIC_0000001262949657__table1357623715271\" border=\"1\" summary=\"\" frame=\"border\" rules=\"all\" cellspacing=\"0\" cellpadding=\"4\">\n<thead align=\"left\">\n<tr id=\"EN-US_TOPIC_0000001262949657__row95761537152712\">\n<th id=\"mcps1.6.3.4.6.2.5.1.1\" class=\"cellrowborder\" align=\"left\" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p1557616378274\">Network Access Type<\/p>\n<\/th>\n<th id=\"mcps1.6.3.4.6.2.5.1.2\" class=\"cellrowborder\" align=\"left\" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p1557643717277\">4G Authentication Mode<\/p>\n<\/th>\n<th id=\"mcps1.6.3.4.6.2.5.1.3\" class=\"cellrowborder\" align=\"left\" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p155761375275\">5G Authentication Mode<\/p>\n<\/th>\n<th id=\"mcps1.6.3.4.6.2.5.1.4\" class=\"cellrowborder\" align=\"left\" valign=\"top\" width=\"55.00000000000001%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p20576133719279\">Description<\/p>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr id=\"EN-US_TOPIC_0000001262949657__row4576113712274\">\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.1 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p17576123742717\">3GPP<\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.2 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p16576143710279\">EPS AKA<\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.3 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p19576173712271\">EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup864833514311\">&#8216;<\/sup>, 5G AKA<\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.4 \" valign=\"top\" width=\"55.00000000000001%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p35761744845\">Compared with EPS-AKA, EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup1173815415472\">&#8216;<\/sup>\u00a0changes the authentication vector from a quadruple to a quintuple. The improved security level makes subscriber authentication data safer.<\/p>\n<p id=\"EN-US_TOPIC_0000001262949657__p4354363311\">Compared with EPS AKA, 5G AKA:<\/p>\n<ul id=\"EN-US_TOPIC_0000001262949657__ul74022088334\">\n<li id=\"EN-US_TOPIC_0000001262949657__li16634141233317\">Supplements the home domain confirmation procedure to defend against spoofing attacks.<\/li>\n<li id=\"EN-US_TOPIC_0000001262949657__li1529312912475\">Does not support the request for multiple authentication vectors at a single time or authentication vector pre-acquisition, therefore it provides higher security.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr id=\"EN-US_TOPIC_0000001262949657__row81521848202811\">\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.1 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p17153174817285\">Non-3GPP<\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.2 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p315384810285\">EAP-AKA, EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup128717246313\">&#8216;<\/sup><\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.3 \" valign=\"top\" width=\"15%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p815314813282\">EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup19334204910316\">&#8216;<\/sup><\/p>\n<\/td>\n<td class=\"cellrowborder\" headers=\"mcps1.6.3.4.6.2.5.1.4 \" valign=\"top\" width=\"55.00000000000001%\">\n<p id=\"EN-US_TOPIC_0000001262949657__p8153348192819\">Compared with EAP-AKA, EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup48711455366\">&#8216;<\/sup>:<\/p>\n<ul id=\"EN-US_TOPIC_0000001262949657__ul1467125105212\">\n<li id=\"EN-US_TOPIC_0000001262949657__li96320447498\">Provides an updated key export mechanism, with different keys used for different access networks, enhancing integrity and security.<\/li>\n<li id=\"EN-US_TOPIC_0000001262949657__li1214104715529\">Supports exchange of the EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup13776512141617\">&#8216;<\/sup>\u00a0capability between the peer and server to defend against attackers&#8217; manipulation during the negotiation process and the consequent rollback from EAP-AKA<sup id=\"EN-US_TOPIC_0000001262949657__sup255513421214\">&#8216;<\/sup>\u00a0to EAP-AKA.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Don&#8217;t miss our <a href=\"https:\/\/www.5gworldpro.com\/5g-security\/\">5G Security Training<\/a> to learn more about the last updates.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>5G introduces new architectures, services, and technologies to meet the increasingly stringent requirements on experience and applications. However, these additions also bring with them new security challenges. For example, the new software architecture has its own security requirements in aspects such as slice security protection and multi-slice risk management. In terms of new services, 5G [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23185,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":{"0":"post-23178","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-5g-knowledge"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the major security threats to the 5G air interface? - E-Commerce Revolution<\/title>\n<meta name=\"description\" content=\"What are the major security threats to the 5G air interface? 5G Security training\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/new.5gworldpro.com\/?p=23178\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the major security threats to the 5G air interface?\" \/>\n<meta property=\"og:description\" content=\"What are the major security threats to the 5G air interface? 5G Security training\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.5gworldpro.com\/?p=23178\" \/>\n<meta property=\"og:site_name\" content=\"E-Commerce Revolution\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T16:47:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178\",\"url\":\"https:\/\/new.5gworldpro.com\/?p=23178\",\"name\":\"What are the major security threats to the 5G air interface? - E-Commerce Revolution\",\"isPartOf\":{\"@id\":\"https:\/\/new.5gworldpro.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage\"},\"image\":{\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp\",\"datePublished\":\"2024-01-03T16:47:49+00:00\",\"dateModified\":\"2024-01-03T16:47:49+00:00\",\"author\":{\"@id\":\"https:\/\/new.5gworldpro.com\/#\/schema\/person\/21ee7fd1dedad31584e8896ccdf4b5a9\"},\"description\":\"What are the major security threats to the 5G air interface? 5G Security training\",\"breadcrumb\":{\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/new.5gworldpro.com\/?p=23178\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage\",\"url\":\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp\",\"contentUrl\":\"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/new.5gworldpro.com\/?p=23178#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/new.5gworldpro.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the major security threats to the 5G air interface?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/new.5gworldpro.com\/#website\",\"url\":\"https:\/\/new.5gworldpro.com\/\",\"name\":\"E-Commerce Revolution\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/new.5gworldpro.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/new.5gworldpro.com\/#\/schema\/person\/21ee7fd1dedad31584e8896ccdf4b5a9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/new.5gworldpro.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/94d7dcbfa1a531e9cb59cb3448b8da6a0f7d75131fc0849c70660340ed50289e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/94d7dcbfa1a531e9cb59cb3448b8da6a0f7d75131fc0849c70660340ed50289e?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/new.5gworldpro.com\"],\"url\":\"https:\/\/new.5gworldpro.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are the major security threats to the 5G air interface? - E-Commerce Revolution","description":"What are the major security threats to the 5G air interface? 5G Security training","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/new.5gworldpro.com\/?p=23178","og_locale":"en_US","og_type":"article","og_title":"What are the major security threats to the 5G air interface?","og_description":"What are the major security threats to the 5G air interface? 5G Security training","og_url":"https:\/\/new.5gworldpro.com\/?p=23178","og_site_name":"E-Commerce Revolution","article_published_time":"2024-01-03T16:47:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/new.5gworldpro.com\/?p=23178","url":"https:\/\/new.5gworldpro.com\/?p=23178","name":"What are the major security threats to the 5G air interface? - E-Commerce Revolution","isPartOf":{"@id":"https:\/\/new.5gworldpro.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage"},"image":{"@id":"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage"},"thumbnailUrl":"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp","datePublished":"2024-01-03T16:47:49+00:00","dateModified":"2024-01-03T16:47:49+00:00","author":{"@id":"https:\/\/new.5gworldpro.com\/#\/schema\/person\/21ee7fd1dedad31584e8896ccdf4b5a9"},"description":"What are the major security threats to the 5G air interface? 5G Security training","breadcrumb":{"@id":"https:\/\/new.5gworldpro.com\/?p=23178#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.5gworldpro.com\/?p=23178"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new.5gworldpro.com\/?p=23178#primaryimage","url":"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp","contentUrl":"https:\/\/new.5gworldpro.com\/wp-content\/uploads\/2023\/10\/6ZmzbEamu8dZBjgqoMYZDj-jpg.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/new.5gworldpro.com\/?p=23178#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.5gworldpro.com\/"},{"@type":"ListItem","position":2,"name":"What are the major security threats to the 5G air interface?"}]},{"@type":"WebSite","@id":"https:\/\/new.5gworldpro.com\/#website","url":"https:\/\/new.5gworldpro.com\/","name":"E-Commerce Revolution","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.5gworldpro.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/new.5gworldpro.com\/#\/schema\/person\/21ee7fd1dedad31584e8896ccdf4b5a9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new.5gworldpro.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/94d7dcbfa1a531e9cb59cb3448b8da6a0f7d75131fc0849c70660340ed50289e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/94d7dcbfa1a531e9cb59cb3448b8da6a0f7d75131fc0849c70660340ed50289e?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/new.5gworldpro.com"],"url":"https:\/\/new.5gworldpro.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/posts\/23178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23178"}],"version-history":[{"count":0,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/posts\/23178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=\/wp\/v2\/media\/23185"}],"wp:attachment":[{"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.5gworldpro.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}