5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Gaps in 4G and 5G Networks Leave Users Open to Hacking

By Jennifer Hooker | March 4, 2019

Your phone calls and even your location could be at risk, according to researchers at Purdue University and the University of Iowa. Tech Xplore reports that recently discovered vulnerabilities in 4G and 5G networks may be just the invitation that hackers need to intercept calls and track users’ whereabouts.

“5G is trying to enforce stronger security and privacy policies than predecessors. However, it inherits many of its characteristics from previous generations, so it’s possible that vulnerabilities that exist in those generations will trickle down to 5G,” Syed Rafiul Hussain, a postdoctoral researcher in computer science at Purdue University, says.

In an attempt to conserve energy, cell networks only sporadically scan for incoming calls, texts, and notifications. These scans are called paging occasions, and they are designed into network protocols. If several calls are placed and cancelled in a short period of time, when the device isn’t scanning for incoming messages, a paging message can be triggered without notifying the device. Hackers can then use this paging message to track a person’s location and send phony paging messages to interfere with text and calls from coming to a device, in an attack known as a “torpedo.”

“It doesn’t require an experienced hacker to perform this attack,” says Hussain. “Anyone with a little knowledge of cellular paging protocols could carry it out.”

The researchers also note that torpedoes could be used to snatch a device’s international mobile subscriber identity (IMSI) on 4G networks and obtain a user’s Twitter handle or phone number, on both 4G and 5G networks.

The findings were presented at the Network and Distributed Security Symposium in San Diego.

Related Articles Read More >

Second-generation tech extends range by 50 percent
Sequans announces production of latest LTE module
Transceiver supports 2.4 GHz ISM and SATCOM
Vehicles get Wi-Fi 7 with ublox module

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World