The current mobile communication environment relies on a blend of overlapping technologies, including 3G, 4G/LTE, and 5G. These cellular communication options facilitate data exchange between mobile user devices (such as phones, tablets, or vehicles) and external infrastructure like evolved base stations. In the UK, 5G coverage has reached 64%, while 4G/LTE covers 92% of the country. Despite efforts to upgrade to the latest 5G technology, a significant portion of the mobile network still depends on 4G or even 3G in some cases.
4G/LTE was initially developed as a response to the rising demand for high-speed mobile data transmission. However, its limitations prompted the development and deployment of 5G to accommodate enhanced mobile broadband, ultra-reliable and low-latency communications, and massive machine-type communications. 5G also brings improvements in data security, particularly with its transition to IPv6 to accommodate the increasing number of IoT devices.
While 5G rollout began in 2019 in the UK, there are no plans to completely replace the previous 4G generation. Instead, a symbiotic relationship between the two technologies is preferred, likely as a compromise to address both urban and rural areas. The fusion of 4G and 5G technologies results in a mix of security protocols with varying levels of protection against threats to data confidentiality, integrity, and availability.
Both 4G/LTE and 5G networks have vulnerabilities that can be exploited by cybercriminals, such as eavesdropping, denial of service attacks, and man-in-the-middle attacks. The 5G network aims to address many of these vulnerabilities, but faster data transfer and increased processing power may also lead to faster hacking attempts.
The adoption of IPv6 in 5G infrastructure could be slowed down by issues related to its longer header and higher jitter when compared to IPv4. Overall, the combination of 4G and 5G technologies is expected to remain the preferred layout for the foreseeable future, but this blend of technologies also means that security protocols must be consistently updated and enforced to protect users and their data.
To improve cellular networks and address the risks involved in data exchange, various methods and products are recommended. These include encrypting data in transit, including the IMSI, and periodically refreshing the TMSI allocated to the UE. Additionally, enforcing user data integrity protection activation on the network operator side, securing the UE's handover process from one eBS to another, using mobile edge computing, and implementing integrity checking algorithms and blockchain technology can all contribute to a safer environment in which vehicles can remain connected and up-to-date.