This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

The Revolutionary Impact of 5g Technology on 2020

downloadDownload printPrint

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online


The global data volume is expected to reach 175 zettabytes by 2025. For comparison: in 2010, when 4G networks just started to be deployed everywhere, it did not exceed 1.2 zettabytes. 5G is the fifth generation cellular technology. It is expected that 5G will be 100 times faster than 4G, delays will be reduced by 25 times, and up to one million devices per square kilometer will be able to connect to the network. 5G is based on five technologies: millimeter waves, small cells, massive multi-channel input-output (MIMO), beamforming and full-duplex mode.

A significant increase in the number of connected devices and the speed of data exchange between them naturally leads to an increase in the number and scale of threats. The development and interaction of various systems within 5G opens the door to many risks, which we will discuss below.

Vulnerabilities in telecommunications services and infrastructure

With the spread of 5G technology, more and more shortcomings and shortcomings in the network equipment, client software and regulatory mechanisms from the authorities will emerge. These flaws can be used by cybercriminals to disable telecommunications infrastructure, monitor customers of mobile operators, or redirect traffic to their resources. Governments need to create conditions at the state level for the application of objective and specialized methods for evaluating 5G consumers and service providers in order to track deficiencies and prescribe their correction.

User Security and Privacy Issues

The situation with data privacy will be complicated. The use of 5G networks with a short coverage radius will lead to the fact that more base stations of cellular communication will appear in business centers and other buildings. This will allow anyone who has the necessary tools to determine the exact location of network users.

In addition, 5G communication service providers will have access to the vast amount of data coming from user devices. This data will allow them to find out what is happening in the client’s house, or to get an idea of the environment in which he lives, for example, using information from sensors. This could lead to a violation of user data privacy and abuse. Mobile operators can also sell information about their customers to other companies, such as advertising, to get additional income.

In some cases, vulnerabilities can harm people’s health – for example, if the user’s medical devices are disconnected from the network or malfunctioning. Possible threats will be even greater if critical infrastructure facilities, such as water and electricity networks, are in danger.

Expansion of critical infrastructure and associated risks

5G technology allows you to establish communication in many geographical regions where it is currently absent. Even stand-alone devices will be equipped with remote monitoring and control systems. An increased number of connected devices and systems will increase the number of potential threats. People easily get used to convenience and constant communication, but the risks associated with this threaten public safety.

Action plan

5G will have a revolutionary impact on the field of telecommunications, because it is not only a promising technology in itself, but also a basis for other developments and innovative solutions, in particular, in the field of smart cities, smart energy systems and defense complexes. This is a new generation of cellular networks using the existing 4G LTE standard along with millimeter waves. The 5G network will be able to serve more connected devices, while the communication speed for all users will increase significantly.

However, like any large-scale technology, especially developing, 5G will attract the attention of cybercriminals seeking new opportunities for attacks. For example, we are likely to witness large-scale DDoS attacks, and it will be more difficult to protect branched networks of connected systems in which damage to one device can cause the entire network to fail. In addition, since 5G technology is based on existing infrastructure, it will inherit all the vulnerabilities and configuration errors of its predecessors.

Previously used confidence models will have to be abandoned. Internet of Things and Machine Interconnection (M2M) devices will consume most of the network resources. The interaction of these devices on a 5G network is likely to lead to new problems associated with their design and behavior.

Given these concerns and political challenges, it would be advisable to use a zero-confidence model and strictly comply with product quality requirements in order to establish a secure interaction between users and technology providers. Government and industry leaders must join forces and promote reliable and safe projects based on 5G technology, which will improve the quality of services and life in smart cities.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

The Revolutionary Impact Of 5g Technology on 2020. (2021, May 31). GradesFixer. Retrieved September 24, 2022, from
“The Revolutionary Impact Of 5g Technology on 2020.” GradesFixer, 31 May 2021,
The Revolutionary Impact Of 5g Technology on 2020. [online]. Available at: <> [Accessed 24 Sept. 2022].
The Revolutionary Impact Of 5g Technology on 2020 [Internet]. GradesFixer. 2021 May 31 [cited 2022 Sept 24]. Available from:
copy to clipboard

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.


    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts


    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!


    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Don't use plagiarized sources. Get your custom essay. Get custom paper

    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery