Skip to main content
. 2022 Mar 2;22(5):1969. doi: 10.3390/s22051969

Table 1.

Security and privacy issues in earlier mobile networks.

Mobile Networks Supported Services and Functions Security and Privacy Issues
1G
  • Deliver voice communications services

  • Uses analog modulation techniques, lacks a specified wireless standard

  • Unencrypted nature of telephone services

  • Unauthorized access and eavesdropping attacks

  • Cloning attacks

2G
  • Enable voice and short messaging services

  • Anonymity is achieved via anonymous identifiers

  • TMSI privacy solution and radio path encryption

  • Unauthorized access

  • One-way authentication issue

  • IMSI-catcher attacks

  • Traceability attacks

  • Eavesdropping attacks

  • End to end encryption problem

3G
  • Provide internet access

  • Advanced services such as TV streaming, internet browsing

  • Air interface security and user authentication

  • 3GPP supports various privacy considerations for 3G networks include securely locating, identifying

  • Two-way authentication

  • Authentication server attacks

  • Integrity threats,

  • Unauthorized data access,

  • Denial of Service (dos) attacks

  • Unauthorized service access

  • AKA sniffing attacks

4G
  • Handle complex applications such as High-Definition Television (HD TV)

  • Support diversity of intelligent mobile terminals

  • 4G networks offered up to 1 Gbit per second for downlink transmission

  • 500 Mbit per second for uplink communication

  • Tampering hardware platforms

  • Viruses and operating system attacks

  • Medium Access Control (MAC) layer vulnerabilities

  • Eavesdropping and replay attacks

  • Data integrity attacks

  • Unauthorized access attacks

  • Authentication issues

5G
  • Connecting higher number of growing devices

  • Delivering higher quality services to all network entities

  • Enhanced Ultra-Reliable, Low Latency Communication (ERLLC)

  • Software-Defined Networking (SDN) and Network Functions Virtualization (NFV)

  • Support high requirements to ensure service and resources availability and continuity

  • DoS or resource attacks

  • Hiding of active and passive eavesdropping using large MIMOs

  • SDN threats and rogue applications

  • NFV services security problems

  • 5G-AKA attacks and issues

  • IMSI-catcher attacks

  • Voice IP attacks

  • Traceability attacks

  • Exploiting information from failure messages