Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Security Transition from 4G to 5G - Are We Secure Enough?

BruCON Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security transition from 4G to 5G networks in this comprehensive conference talk from BruCON Security Conference. Delve into newly discovered vulnerabilities affecting devices and subscribers, despite 5G's improved security measures. Examine a set of protocol vulnerabilities in 5G/4G networks, impacting operator equipment and consumer devices like phones, routers, IoT sensors, and car modems. Learn about automated tools developed to exploit cellular information and gain insights from shared research traces and datasets. Witness demonstrations of new hijacking, bidding down, and battery draining attacks using low-cost hardware and software tools. Discover the surprising results of worldwide testing to estimate affected base stations. Gain valuable knowledge about interactions with vendors and standard bodies, as well as potential fixes to prevent these attacks. Cover topics including WiFi importance, service base architecture, cloud security principles, 5G use cases, radio capabilities, mobile networks, fingerprints, man-in-the-middle attacks, power-saving mode, location tracking, authentication, and core network security.

Syllabus

Introduction
Why WiFi is important
The problem with WiFi
Service Base Architecture
What makes this situation complicated
Cloud security principles
Use case of 5G
Greek wiretapping scandal
The problem of scope
The problem of Co Network
Snowden
MC catcher
Capabilities
Radio Capabilities
Registration
Setup
MNMap
Mobile Networks
Saving capabilities
Fingerprints
Who is BruCON
Supported devices
common fingerprints
two GPS
SIM cards
Maninthemiddle attack
Modifications
Security Mode
Live Networks
Why is this happening
Power Saving Mode
Battery Life
Location Tracking
Authentication
Security improvements
MC Cache
Sequence Number
Targeted Attack
Core Network
NATO Report
Questions

Taught by

BruCON Security Conference

Reviews

Start your review of Security Transition from 4G to 5G - Are We Secure Enough?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.