1G |
Deliver voice communications services
Uses analog modulation techniques, lacks a specified wireless standard
|
|
2G |
Enable voice and short messaging services
Anonymity is achieved via anonymous identifiers
TMSI privacy solution and radio path encryption
|
|
3G |
Provide internet access
Advanced services such as TV streaming, internet browsing
Air interface security and user authentication
3GPP supports various privacy considerations for 3G networks include securely locating, identifying
|
Two-way authentication
Authentication server attacks
Integrity threats,
Unauthorized data access,
Denial of Service (dos) attacks
Unauthorized service access
AKA sniffing attacks
|
4G |
Handle complex applications such as High-Definition Television (HD TV)
Support diversity of intelligent mobile terminals
4G networks offered up to 1 Gbit per second for downlink transmission
500 Mbit per second for uplink communication
|
Tampering hardware platforms
Viruses and operating system attacks
Medium Access Control (MAC) layer vulnerabilities
Eavesdropping and replay attacks
Data integrity attacks
Unauthorized access attacks
Authentication issues
|
5G |
Connecting higher number of growing devices
Delivering higher quality services to all network entities
Enhanced Ultra-Reliable, Low Latency Communication (ERLLC)
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV)
Support high requirements to ensure service and resources availability and continuity
|
DoS or resource attacks
Hiding of active and passive eavesdropping using large MIMOs
SDN threats and rogue applications
NFV services security problems
5G-AKA attacks and issues
IMSI-catcher attacks
Voice IP attacks
Traceability attacks
Exploiting information from failure messages
|