5G Security Threat Assessment in Real Networks

被引:12
|
作者
Park, Seongmin [1 ]
Kim, Daeun [1 ]
Park, Youngkwon [1 ]
Cho, Hyungjin [1 ]
Kim, Dowon [1 ]
Kwon, Sungmoon [1 ]
机构
[1] Korea Internet & Secur Agcy, Infrastruct Secur Technol Team, 9 Jinheung Gil, Naju Si 58324, South Korea
关键词
5G mobile communication; non-standalone; mobile network; RRC; NAS; GTP; SIP; 5G security testing;
D O I
10.3390/s21165524
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users' personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation
    Lichtman, Marc
    Rao, Raghunandan
    Marojevic, Vuk
    Reed, Jeffrey
    Jover, Roger Piqueras
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [32] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3682 - 3722
  • [33] Towards 5G Security
    Horn, Guenther
    Schneider, Peter
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1165 - 1170
  • [34] 5G Network and Security
    Jinsong, Ma
    Yamin, Mohammad
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 249 - 254
  • [35] 5G, Security, and You
    Kshetri, Nir
    Voas, Jeffrey
    COMPUTER, 2020, 53 (03) : 62 - 66
  • [36] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [37] Physical Layer Security for 5G Wireless Networks, Part II
    Wu, Yongpeng
    Khisti, Ashish
    Xiao, Chengshan
    Caire, Giuseppe
    Wong, Kai-Kit
    Gao, Xiqi
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) : 1363 - 1366
  • [38] PKI-Based Security Enhancement for IoT in 5G Networks
    Khan, Nayeem Ahmad
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 217 - 225
  • [39] Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey
    Vega Sanchez, Jose David
    Urquiza-Aguiar, Luis
    Paredes Paredes, Martha Cecilia
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [40] A Robust Security Architecture for SDN-Based 5G Networks
    Yao, Jiaying
    Han, Zhigeng
    Sohail, Muhammad
    Wang, Liangmin
    FUTURE INTERNET, 2019, 11 (04)