LTE vs. 5G security: A Comparison of Security Features

Introduction

In the realm of wireless communication, both LTE (Long-Term Evolution) and 5G networks play pivotal roles in providing high-speed connectivity. However, when it comes to security, there are notable differences between the two generations. Let’s explore the comparison of LTE vs. 5G security features.

LTE vs. 5G security comparison table

Sr. No.Security Feature4G5G
1Privacy and Integrity CipherLTE employs encryption on the radio path between the mobile station and the eNodeB (LTE base station). It also utilizes control plane ciphering and integrity mechanisms between the User Equipment (UE) and the Mobility Management Entity (MME). The supported encryption algorithms in LTE are 128-bit in strength.In contrast, 5G builds upon LTE’s security foundation by proposing support for 256-bit encryption algorithms in future releases. Additionally, 5G implements integrity measures to prevent unauthorized changes to user data, providing an added layer of protection.  
2Authentication Key Agreement (AKA)  In LTE, a shared key is provisioned in the Universal Integrated Circuit Card (UICC) and the Authentication Server Function (AUSF) in the network. This shared key facilitates mutual authentication between the UE and the network, ensuring secure communication.  5G introduces access-agnostic authentication, utilizing Extensible Authentication Protocol (EAP). It supports 5G-AKA and EAP-AKA’ for both 3GPP and non-3GPP access technologies. This enhanced authentication mechanism safeguards the confidentiality of initial non-access stratum (NAS) messages exchanged between the device and the network.  
3Security Anchor Function (SEAF) or Anchor Key  LTE does not have a specific security anchor function or anchor key. However, in 5G, the security anchor function enables the re-authentication of the UE as it moves between different access networks or serving networks. This functionality avoids the need for full authentication every time the UE switches networks, improving efficiency and security.  5G introduces access-agnostic authentication, utilizing Extensible Authentication Protocol (EAP). It supports 5G-AKA and EAP-AKA’ for both 3GPP and non-3GPP access technologies. This enhanced authentication mechanism safeguards the confidentiality of initial non-access stratum (NAS) messages exchanged between the device and the network.  
4Subscriber Permanent Identifier (SUPI)  In LTE, the subscriber identifier (IMSI) is sent in plaintext prior to network authentication, potentially exposing sensitive information.  5G introduces the Subscription Concealed Identifier (SUCI), which utilizes the home network’s public key to encrypt the Mobile Subscriber Identification Number (MSIN) part of the subscriber identifier. This protects the confidentiality of NAS messages during the initial stages of network authentication.
5Home Control  LTE does not have a specific home control feature.In 5G, Home Public Mobile Network (HPMN) can verify the presence of the UE and authenticate requests for service from the Visited Public Mobile Network (VPMN). This capability is particularly useful in roaming scenarios and aids in fraud prevention.  
Network Exposure Function (NEF)  While LTE does not have the concept of a Network Exposure Function (NEF5G leverages NEF to securely expose network capabilities and events to authorized third-party Application Functions (AFs). NEF enables authenticated and authorized AFs to access information within the 3GPP network. Mutual authentication using certificates may be employed to establish secure communication between NEF and AF.  
Security Edge Proxy Protection  LTE does not incorporate specific security edge proxy protection.Within the 5G ecosystem, the implementation of security edge proxy protection assumes a critical role by functioning as an authoritative security gateway, adeptly safeguarding the interconnections established between the home network and visited networks.. This protection safeguards the home network’s edge, reinforcing security measures on the interconnections.  
LTE (4G) vs. 5G security feature

Conclusion

By understanding the security enhancements in 5G compared to LTE, we recognize the on-going commitment to strengthening the security posture in wireless networks. The introduction of advanced encryption algorithms, access-agnostic authentication, and additional security functions ensures that 5G networks are well-equipped to address the evolving security challenges of the digital age.

Leave a comment