This paper shall provide an analysis of the security architectures of mobile connected networks, where these networks are susceptible in being compromised, popular attack techniques, and the mitigations against attacks.
The popularity of mobile network connected devices continues to expand exponentially. An estimated 5 billion devices exist worldwide. With the expansion of wearable devices, a regular user can carry up to two network connected devices. The 5G network attracts users by advertising low latency data communication and high download and upload speeds. With the number of subscribers on the rise, it is no surprise that concerns of information and cyber security would heighten to match the integrity of data safety. As with any form of information security, there is always privacy concerns of users and their sensitive data. This paper shall provide an analysis of the security architectures of mobile connected networks, where these networks are susceptible in being compromised, popular attack techniques, and the mitigations against attacks.