# <center><i class="fa fa-edit"></i> Securing the 5G Era </center>
###### tags: `Internship`
:::info
The main goal is to focus on what are the main concerns on each technology levarages of 5G.
**Resources:**
[Securing the 5G Era](https://www.gsma.com/security/securing-the-5g-era/)
:::
# Output
## Virtualisation
**Characteristic:**
Core network operations may be performed through functions outside the operator network e.g. the cloud.
**Solution:**
Suitable isolation controls reduce the risk of data leakage and the impact of virtualisation aware malware outbreaks
## Cloud Services
**Characteristic:**
5G architecture has been designed to be cloud native as it brings elasticity and scalability.
**Solution:**
5G allows operators to expose rich services through the Cloud and Restful API’s. Secure coding practices should be followed ensuring data is not leaked and the code cannot be used to exploit the cloud provider or operator network.
## Network Slicing
**Characteristic:**
Network slicing allows the operator to customise the behaviour of the network, adapting (slicing) the network to service specific use cases using the same hardware.
**Solution:**
The security model for each slice should be adapted to the use case.
## Mobile IoT
**Characteristic:**
Three common attack scenarios:
Attacks on the devices (endpoints) via the applications running on the device, remote attacks from the internet and via physical attack.
Attacks on service platforms (i.e. the cloud)
Attacks on the communications links (e.g. Cellular, WLAN, BLE air interface etc.)
**Solution:**
IoT devices are increasingly being leveraged to launch DDoS attacks as each device creates some form of data, this linked with the volumes of devices results in significant volume-based attacks.
## eSIM
**Characteristic:**
eSIM with the data on that card instead being prepared on a remote SIM provisioning platform (SM-DP+) then downloaded in the form of an eSIM Profile via HTTPS into a secure element (eUICC) permanently embedded into the mobile device.
**Solution:**
The system uses Public Key Infrastructure (PKI) certificates allowing the SM-DP+ and eUICC to mutually authenticate each other. All keys are generated with Perfect Forward Secrecy (PFS).
Management of eSIM Profiles on the eUICC is carried out by the End User in the consumer use case, or a remote sim provisioning platform in the M2M/IoT use case.
## Artificial Intelligence (AI)
**Characteristic:**
This technology is available to the attacker and AI-driven attacks are anticipated.
**Solution:**
Operators should leverage Machine Learning (ML) and Deep Learning (DL) to automate threat and fraud detection.