1 Yeshiva University,
2 Hult International Business School,
3 Arizona State University,
4 University of Memphis,
5 Yeshiva University,
6 Yeshiva University,
World Journal of Advanced Research and Reviews, 2026, 29(03), 884-895
Article DOI: 10.30574/wjarr.2026.29.3.0598
Received on 02 February 2026; revised on 09 March 2026; accepted on 12 March 2026
The implementation of fifth-generation (5G) mobile communication technology can be considered the biggest step in the contemporary global telecommunications environment, as it has better performance potential, a much lower latency rate, and is compatible with a wide range of network devices. Still, this new technology has numerous security risks that should be taken into consideration to ensure the integrity and privacy of the network technologies. The design of 5G network technology shall be used in our research paper to fully indicate the vulnerabilities that arise in the network due to the reliance of the network on software-defined networks, network function virtualisation, and network slicing technology. In addition, the paper also addresses the security issues of the massive attack surface that 5G networks can create, such as the issues of the greater number of devices, edge computing, and supply chains. In order to overcome these security issues in the 5G technology, the paper suggests mechanisms to overcome security vulnerabilities in architectures as well as security at the network level (Singh et al, 2024). A great focus has been put on the security of various components of the 5G network, including core and edge devices and the necessity to take advantage of AI in controlling security threats. Lastly, the paper brings out the relevance of gaps in literature in the field of 5G security, and it is important to note that more studies are needed to come up with effective and scalable security models as 5G technology continues to be implemented in the world today.
Mitigation; Network; Security; Threats; Vulnerabilities; 5G
Preview Article PDF
Hilton Hatitye Chisora, Munashe Naphtali Mupa, Irene Chiedza Chitate, Kelvin Gyimah Agyei, Ken Mudzingwa and Rodney Chiwanga. Network Security in 5G - threats, vulnerabilities and mitigation strategies. World Journal of Advanced Research and Reviews, 2026, 29(03), 884-895. Article DOI: https://doi.org/10.30574/wjarr.2026.29.3.0598.