Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Warnings sounded over future of 5G mobile network

Post Thumbnail

Dundee researchers have issued warnings over potential security threats faced by the soon-to-be introduced 5G mobile phone network.

Computing and security experts from Dundee University have discovered the much-vaunted upgrade is not as secure as once thought.

5G, which has been described as a “rocket fuel” for connectivity between internet enabled devices, could be introduced in the UK as early as next year.

A group of scientists, comprised of researchers from Dundee University, ETH Zurich, and the University of Lorraine INRIA in Switzerland, said there were still large gaps in the security network which could be compromised by cyber-attack.

In particular, the research group discovered individual users could be susceptible to targeted attacks or hacks.

The current 4G network is currently still not available to almost 25% of the country.

With the introduction of 5G, communication information stations will be able to connect to more individual devices, meaning phones, laptops, and “internet of things” devices like smart-fridges and cars will be able to hook-up to the service.

Dr Saša Radomirovic, senior lecturer in the school of computing, is one of the research team.

He said: “People will use 5G like they use 4G now, to make calls, send texts, swap pictures, or make payments and purchases.

“But 5G will likely also be present in autonomous vehicles, internet of things devices, and industrial control systems, for example.

“It has been promised to be faster and more secure than previous networks but we’ve found that it isn’t as secure as hoped.

“In its current state, 5G does not close all the security gaps, which could result in numerous cyber-attacks and users being charged for the mobile phone usage of a third party.

He continued: “We have proposed a number of improvements to close these gaps.

“What we remain concerned about are the less than perfect privacy protections it provides leaving users vulnerable to targeted attacks.

“The most important take-away from our work is that introducing a new technology without a rigorous formal analysis of its specifications may lead to serious consequences.”

The group will present their findings at an upcoming conference  on computer and communications security in Toronto, Canada where they will further highlight the steps needing taken to close the security holes.